Cambridge IGCSE
INFORMATION AND COMMUNICATION
TECHNOLOGY 0417
Past Papers
Paper1 Theory
Part I
2023 – 2015
Cambridge IGCSE™
*0123456789*
INFORMATION AND COMMUNICATION TECHNOLOGY
0417/01
For examination from 2023
Paper 1 Theory
1 hour 30 minutes
SPECIMEN PAPER
You must answer on the question paper.
No additional materials are needed.
INSTRUCTIONS
●
Answer all questions.
●
Use a black or dark blue pen.
●
Write your name, centre number and candidate number in the boxes at the top of the page.
●
Write your answer to each question in the space provided.
●
Do not use an erasable pen or correction fluid.
●
Do not write on any bar codes.
●
You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
●
The total mark for this paper is 80.
●
The number of marks for each question or part question is shown in brackets [ ].
●
No marks will be awarded for using brand names of software packages or hardware.
This document has 12 pages.
© UCLES 2020
[Turn over
2
1
Circle two items which are internal hardware components.
Actuator
Keyboard
Linker
Monitor
Mouse
Printer
Processor
Sound card
[2]
2
One component of the internal memory of a computer is Random Access Memory (RAM).
State two characteristics of RAM.
1 ........................................................................................................................................................
...........................................................................................................................................................
2 ........................................................................................................................................................
...........................................................................................................................................................
[2]
3
Tick () which device produces solid objects.
A Inkjet printer
B Dot matrix printer
C Laser printer
D 3D printer
[1]
4
For each of the following uses of data capture, name one appropriate direct data entry device. The
devices must be different in each case.
(a) Contactless credit cards
............................................................................................................................................... [1]
(b) Multiple choice answers in an examination paper
............................................................................................................................................... [1]
(c) To scan items at a computerised till
............................................................................................................................................... [1]
© UCLES 2020
0417/01/SP/23
3
5
A glasshouse is used to grow plants and is computer controlled.
(a) Name three sensors which could be used in this glasshouse.
1 .................................................................................................................................................
2 .................................................................................................................................................
3 .................................................................................................................................................
[3]
(b) Give two reasons why data from the sensors need to be converted for use by a computer.
1 .................................................................................................................................................
....................................................................................................................................................
2 .................................................................................................................................................
6
....................................................................................................................................................
[2]
A smartphone has many uses, for example making and receiving telephone calls.
Give four other uses of a smartphone.
1 ........................................................................................................................................................
...........................................................................................................................................................
2 ........................................................................................................................................................
...........................................................................................................................................................
3 ........................................................................................................................................................
...........................................................................................................................................................
4 ........................................................................................................................................................
...........................................................................................................................................................
[4]
© UCLES 2020
0417/01/SP/23
[Turn over
4
7
A developer is writing a program to record the results of examinations taken by students in a
school.
(a) The program will be tested to make sure that it works.
There are three types of test data that can be used to test a system: normal, abnormal and
extreme.
Explain what is meant by normal, abnormal and extreme test data.
Normal .......................................................................................................................................
....................................................................................................................................................
Abnormal ...................................................................................................................................
....................................................................................................................................................
Extreme .....................................................................................................................................
....................................................................................................................................................
[3]
(b) The program collects a large amount of data and this could be stored using either a fixed
solid-state drive (SSD) or cloud storage.
The developer is planning to use cloud storage.
(i)
Describe four advantages to the school of using cloud storage rather than using the
SSD.
1 .........................................................................................................................................
............................................................................................................................................
2 .........................................................................................................................................
............................................................................................................................................
3 .........................................................................................................................................
............................................................................................................................................
4 .........................................................................................................................................
............................................................................................................................................
[4]
© UCLES 2020
0417/01/SP/23
5
(ii)
Describe three disadvantages to the school of using cloud storage rather than using the
SSD.
1 .........................................................................................................................................
............................................................................................................................................
2 .........................................................................................................................................
............................................................................................................................................
3 .........................................................................................................................................
............................................................................................................................................
[3]
(c) The developer spends a great deal of time using a computer.
For each of the statements given, identify a health problem and describe a possible solution.
Your answers must be different in each case.
Health problem
Possible solution
Using a mouse for a long
period of time
Sitting for too long in one
position
[4]
8
A company has an extranet.
Explain what is meant by an extranet.
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...................................................................................................................................................... [3]
© UCLES 2020
0417/01/SP/23
[Turn over
6
9
A taxi company tracks the routes their cars have travelled and the current location of each one
using a Global Positioning System (GPS).
A map showing the route taken and current location of each car is displayed on the office monitor.
Describe in detail how this system could work.
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...................................................................................................................................................... [4]
© UCLES 2020
0417/01/SP/23
7
10 A headteacher is planning to hold a video-conference with headteachers from other schools.
The headteachers already have basic internet connected desktop computer systems including a
monitor, keyboard and mouse.
(a) Identify three pieces of additional hardware they need in order to participate in a videoconference.
1 .................................................................................................................................................
2 .................................................................................................................................................
3 .................................................................................................................................................
[3]
(b) A technician is setting up the hardware for the video-conference.
State three tasks the technician would need to do to set up the hardware for the videoconference.
You can assume that the hardware required has already been purchased.
1 .................................................................................................................................................
....................................................................................................................................................
2 .................................................................................................................................................
....................................................................................................................................................
3 .................................................................................................................................................
....................................................................................................................................................
[3]
© UCLES 2020
0417/01/SP/23
[Turn over
8
11
Microprocessor-controlled devices in the home have had positive effects on people’s lifestyles.
One of the positive effects of using these devices is that we can now set a cooker to switch on
whilst we are out so that we arrive home to a cooked meal.
Describe the positive effects of using other microprocessor-controlled devices in the home.
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...................................................................................................................................................... [4]
12 Tawara Retail is an online store. This online store does not have physical shops. Customers buy
products from this store using internet shopping.
Describe the advantages to Tawara Retail of offering internet shopping.
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...................................................................................................................................................... [4]
© UCLES 2020
0417/01/SP/23
9
13 A media student is creating a movie, in school, for a project. He needs to take the movie home to
edit it.
The student intends to use a CFast solid-state memory card to transport the movie files.
The student is unable to save the work on the memory card.
Give two error messages that may appear when attempting to save the work.
1 ........................................................................................................................................................
...........................................................................................................................................................
2 ........................................................................................................................................................
...........................................................................................................................................................
[2]
14 Compare the similarities and differences between Bluetooth and wi-fi.
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...................................................................................................................................................... [4]
© UCLES 2020
0417/01/SP/23
[Turn over
10
15 Discuss the advantages and disadvantages to customers of using internet banking rather than
visiting a bank.
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...................................................................................................................................................... [6]
16 Some confidential personal data can be classed as sensitive data.
Name three items of personal data that could also be sensitive data.
1 ........................................................................................................................................................
2 ........................................................................................................................................................
3 ........................................................................................................................................................
[3]
© UCLES 2020
0417/01/SP/23
11
17 A student uses social media to keep in contact with other people.
Describe four strategies that the student could use to stay safe when using social media to
communicate with others.
1 ........................................................................................................................................................
...........................................................................................................................................................
2 ........................................................................................................................................................
...........................................................................................................................................................
3 ........................................................................................................................................................
...........................................................................................................................................................
4 ........................................................................................................................................................
...........................................................................................................................................................
[4]
© UCLES 2020
0417/01/SP/23
[Turn over
12
18 A manager in a hospital has decided to ask a software company to develop a computer system.
The system should allow patients to book all their medical appointments online.
(a) Discuss the advantages and disadvantages to both the patients and the medical staff of this
type of system.
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
............................................................................................................................................... [6]
(b) The manager of the hospital has purchased an expert system to help diagnose their patients’
illnesses.
Name three components of an expert system.
1 .................................................................................................................................................
2 .................................................................................................................................................
3 .................................................................................................................................................
[3]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
© UCLES 2020
0417/01/SP/23
INFORMATION AND COMMUNICATION
TECHNOLOGY
Paper 1 Theory
2020
™
Cambridge IGCSE
*4606582192*
INFORMATION AND COMMUNICATION TECHNOLOGY
Paper 1 Theory
0417/12
February/March 2020
2 hours
You must answer on the question paper.
No additional materials are needed.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
This document has 16 pages. Blank pages are indicated.
03_0417_12_2020_1.21
© UCLES 2020
[Turn over
2
1
A list of hardware items is given.
3D printer
Actuator
LCD monitor
Memory stick
Mouse
RAM
Touch screen
Video card
Webcam
Wide format printer
(a) Identify two input devices from the given list.
1.........................................................................................................................................
2.........................................................................................................................................
[2]
(b) Identify two internal hardware devices from the given list.
1.........................................................................................................................................
2.........................................................................................................................................
[2]
2
Tick (✓) whether the following statements refer to the internet or an intranet.
internet
(✓)
intranet
(✓)
This type of network is public
This is the more secure type of network
This type of network is global
This type of network is more likely to be monitored
[2]
3
Chess players can use expert systems to help them practise chess moves.
Name two other applications which involve the use of expert systems.
1 ................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
[2]
© UCLES 2020
03_0417_12_2020_1.21
3
4
Smart technology is increasingly being used in everyday life. Many people are now using smart
devices such as smartwatches.
(a) Tick (✓) whether the following statements most appropriately refer to a desktop computer,
a tablet computer or a smartwatch.
desktop
computer
(✓)
tablet
computer
(✓)
smartwatch
(✓)
A computer made up of separate units
Is an example of wearable technology
A portable device that allows text to be
typed relatively easily
Most easily used for fitness and health
monitoring by runners
[4]
(b) Smartphones are more likely to be used than laptop computers for everyday ICT use.
Describe three advantages of using a smartphone rather than a laptop computer.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
[3]
© UCLES 2020
03_0417_12_2020_1.21
[Turn over
4
5
A school examinations officer has set up a spreadsheet of candidates for the IGCSE examinations.
Part of the spreadsheet is shown:
The formula in cell A3 is IF(A2<>'''',VLOOKUP(A2,E3:F6,2),'''')
(a) Explain what the formula in cell A3 does.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2020
03_0417_12_2020_1.21
[5]
5
(b) The examinations officer is planning to change the range E3 to F6 in the formula to a named
range.
(i)
Explain why he should do this rather than using the cell references.
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
[3]
(ii) Give an example of an appropriate name he should give the range.
................................................................................................................................
................................................................................................................................
[1]
(c) A formula has been placed in cell F9. The formula is COUNTIF(A4:A15,''E'')
Explain what the formula in cell F9 does.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2020
03_0417_12_2020_1.21
[2]
[Turn over
6
6
A teacher has created a hierarchical file structure to save the registers and marks of each of her
classes on her laptop computer. Part of the structure is shown:
C:
Work
Class_A1
Examination_Marks
Registers
Class_Reports
(a) Write down the file path to locate a document which is stored in the folder Examination_Marks.
C: ......................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(b) The teacher could have saved the document as a .txt or an .rtf file format.
Describe what is meant by .txt and .rtf file formats.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2020
03_0417_12_2020_1.21
[2]
7
(c) Explain the differences between the two file formats.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(d) A master document has been created. The teacher will mail merge the personal details of
each student into the document.
Explain why mail merged documents are used.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2020
03_0417_12_2020_1.21
[4]
[Turn over
8
7
A company is considering developing a laptop computer that only uses biometric methods to
authorise user access to this laptop computer. The developers are considering using facial
recognition.
(a) Explain, giving other examples, why biometric methods are considered to be a more secure
way of authorising access to the laptop computer rather than typing in passwords.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[6]
(b) Describe the disadvantages of using facial recognition to authorise access to the laptop
computer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2020
03_0417_12_2020_1.21
[4]
9
8
A headteacher plans to use a computer database to keep records of the members of staff that
teach in her school. She must choose between using a flat file database or a relational database.
(a) Explain the differences between a flat file database and a relational database.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(b) The school keeps details of the teachers in one file and the subjects they teach in another file.
A teacher teaches more than one subject.
Describe the steps the headteacher would need to take to create a relational database from
this data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
9
[4]
Documents use headers, footers and margins.
The statements refer to a header, a footer or a margin. Tick (✓) the most appropriate term for
each statement.
header
(✓)
footer
(✓)
margin
(✓)
Text entered that can appear at the top of each page
automatically
An area between the main content of a page and the edge
of the page
An additional space between facing pages
Text entered that can appear at the bottom of each page
automatically
[4]
© UCLES 2020
03_0417_12_2020_1.21
[Turn over
10
10 Arjun is taking a gap year between his studies and will be travelling through Kenya. He needs to
remain in contact with his parents and is considering using either a cell phone or VoIP.
(a) Describe the benefits of using each of these communication methods to stay in contact with
his parents.
Cell phone ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
VoIP ..................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(b) From time to time Arjun’s parents transfer money from their bank account to his bank account
using online banking.
Identify one type of transaction they cannot do using online banking.
...........................................................................................................................................
...........................................................................................................................................
[1]
(c) When Arjun logs onto his online banking he needs to enter his username and password. The
system may also ask him to provide an answer to a security question.
Tick (✓) whether the following are appropriate examples of a security question or not.
Appropriate
(✓)
Not appropriate
(✓)
How old are you?
What is your mother’s maiden name?
What is your PIN?
Which town were you born in?
[2]
© UCLES 2020
03_0417_12_2020_1.21
11
(d) Give three benefits of Arjun using online banking in this scenario.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
[3]
(e) Give two drawbacks of Arjun using online banking in this scenario.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
© UCLES 2020
03_0417_12_2020_1.21
[Turn over
12
11
Robots are used in many car production lines.
Discuss how their use has affected the nature of employment in the car production industry.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
[6]
12 When people use the internet for shopping and banking it is essential that they use a website that
has a secure server.
(a) Describe the features of a web page that identify it as using a secure server.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2020
03_0417_12_2020_1.21
[4]
13
(b) As more and more people use smartphones as computer systems, security can be breached.
Smishing and pharming are ways in which data can be compromised on a smartphone.
Compare and contrast smishing and pharming.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2020
03_0417_12_2020_1.21
[6]
[Turn over
14
13 A sales representative is planning a presentation about a new product. He is considering whether
to use a multimedia presentation or to give a talk and hand out leaflets.
(a) Discuss the advantages and disadvantages of using a multimedia presentation rather than
printed leaflets.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2020
03_0417_12_2020_1.21
[8]
15
(b) The sales representative decides to create a multimedia presentation and wishes to place an
image of the new product on one of the slides.
Explain the steps he would need to take to do this.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(c) He searches his company website to find a suitable image for his multimedia presentation.
Part of the markup language from the web page to load the image is shown.
<img src =''New_product.jpg'' alt=''company logo''>
When the markup is run, the words ‘company logo’ are displayed and not the image.
Explain why this may be the case.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2020
03_0417_12_2020_1.21
[2]
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
© UCLES 2020
03_0417_12_2020_1.21
™
Cambridge IGCSE
*7638064276*
INFORMATION AND COMMUNICATION TECHNOLOGY
Paper 1 Theory
0417/11
May/June 2020
2 hours
You must answer on the question paper.
No additional materials are needed.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
This document has 16 pages. Blank pages are indicated.
06_0417_11_2020_1.13
© UCLES 2020
[Turn over
2
1
A computer consists of both hardware and software.
(a) Define the term software.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [2]
(b) There are two types of software.
Identify the types.
1...................................................................................................................................
.....................................................................................................................................
2...................................................................................................................................
.....................................................................................................................................
[2]
2
Tick (✓) whether the following statements refer to a Command Line Interface (CLI) or a Graphical
User Interface (GUI).
CLI
(✓)
GUI
(✓)
The user has to type in every
instruction
The user does not need to
learn any of the instructions
Each instruction has to be
typed in correctly
The user is in direct
communication with the
computer
[2]
© UCLES 2020
06_0417_11_2020_1.13
3
3
Every computer contains input and output devices and a central processing unit (CPU).
(a) Describe the CPU including its role.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [4]
(b) Data can be read directly by using a number of different devices.
Name the most appropriate device used to read the following data.
Cheque No.
.....................................................
0
26815 38221
Branch Code
Account No.
Transaction Code
.....................................................
6
.....................................................
.....................................................
[4]
© UCLES 2020
06_0417_11_2020_1.13
[Turn over
4
4
A hospital is creating a database to store blood donors’ medical details. The fields in the
database include Health_number, Date_of_birth, Gender and Blood_group.
(a) When a new blood donor wishes to give blood they need to fill in a form.
Each blood donor has a unique health number which uses a 10-digit number, for example
9434765919.
Blood group can be A, B, AB or O.
Part of the form is shown below.
Blood donor
1. What is your health number?
2. What is your date of birth?
3. What is your gender?
/
/
M/F
4. What is your blood group?
Name a suitable data type for the answers given to each of the questions in the form. For
any numeric field, specify the type of number.
Question 1...................................................................................................................
Question 2...................................................................................................................
Question 3...................................................................................................................
Question 4...................................................................................................................
[4]
© UCLES 2020
06_0417_11_2020_1.13
5
(b) In the Blood_group field the only data that can be entered is A, B, AB or O.
Tick (✓) whether each of the following blood groups is an example of abnormal or normal
data.
Blood group
abnormal
(✓)
normal
(✓)
AB
C
B
AO
[2]
(c) The administrator needs a list of all the blood donors in the database with blood group A
as well as in the same list all the blood donors with blood group AB. This list will only
include female blood donors.
To find the blood donor with the health number 9434765919 he will need to type in the
following query.
Health_number = 9434765919
Write a query to find all the female blood group donors with the blood group A as well as
those with AB.
.....................................................................................................................................
..................................................................................................................................... [6]
© UCLES 2020
06_0417_11_2020_1.13
[Turn over
6
(d) When the details of a new donor are added to the database the person’s date of birth is
entered.
Explain why the administrator would prefer their date of birth to be stored rather than their
age.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [4]
(e) Name the most appropriate validation check for the Health_number.
.....................................................................................................................................
..................................................................................................................................... [1]
© UCLES 2020
06_0417_11_2020_1.13
7
5
Phishing and pharming can affect the security of a user’s data.
(a) Compare and contrast phishing and pharming.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [6]
© UCLES 2020
06_0417_11_2020_1.13
[Turn over
8
(b) Smishing is another security issue. Describe the methods which can be used to help
prevent smishing.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [6]
6
Tick (✓) which of the following statements apply to LANs, which apply to WANs and which
apply to WLANs.
LAN
(✓)
WAN
(✓)
WLAN
(✓)
The internet is an example of this type of network
This type of network is found in a building but is
connected without cables
This type of network is used to transmit data
between Europe and North America
This type of network is found in a building but is
connected with cables
[4]
© UCLES 2020
06_0417_11_2020_1.13
9
7
The headteacher of a school has decided to replace desktop computers with laptop computers.
Describe the advantages and disadvantages of using a laptop computer rather than a desktop
computer.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
8
[4]
Following recent data protection issues the personal data we allow organisations to share about
us may be reduced.
(a) Discuss the benefits and drawbacks of trying to keep personal data confidential and secure.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [6]
© UCLES 2020
06_0417_11_2020_1.13
[Turn over
10
(b) The sharing of email addresses can lead to spam.
Explain what is meant by the term spam email.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [2]
(c) Explain why spam email should be prevented.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [4]
© UCLES 2020
06_0417_11_2020_1.13
11
9
Point of sale (POS) terminals are used in supermarkets.
(a) Tick (✓) which of the following devices used at a POS terminal are only input devices,
which are only output devices and which are both.
Input
(✓)
Device
Output
(✓)
Both
(✓)
Bar code reader
Buzzer
Touch screen on till
Receipt printer
Light sensor on the conveyor belt
Electronic scales
[6]
© UCLES 2020
06_0417_11_2020_1.13
[Turn over
12
(b) A stock file contains data about the goods being sold. Describe the steps needed to update
the stock file when an item is scanned at the point of sale (POS) terminal. Include in your
description how new stock can be ordered automatically.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [6]
© UCLES 2020
06_0417_11_2020_1.13
13
10 The network manager at a school has been asked to develop a student registration system to
help staff keep a record of student attendance.
(a) Describe the steps required in the analysis of such a system.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [6]
(b) The school is planning to use fingerprints as a way to record when students arrive in the
class.
Describe the advantages and disadvantages of using fingerprint data entry for student
registration systems rather than magnetic ID cards.
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
..................................................................................................................................... [4]
© UCLES 2020
06_0417_11_2020_1.13
[Turn over
14
(c) Fingerprints are one example of biometrics.
Identify three other examples of biometrics.
1...................................................................................................................................
.....................................................................................................................................
2...................................................................................................................................
.....................................................................................................................................
3...................................................................................................................................
.....................................................................................................................................
[3]
11 Most data protection acts include the principle that data should be accurate and, where
necessary, kept up to date.
List four other principles of a typical data protection act.
1..........................................................................................................................................
............................................................................................................................................
2..........................................................................................................................................
............................................................................................................................................
3..........................................................................................................................................
............................................................................................................................................
4..........................................................................................................................................
............................................................................................................................................
[4]
© UCLES 2020
06_0417_11_2020_1.13
15
12 The way we buy products using credit cards has changed in recent years. Originally the magnetic
stripe on the back of the card was used with a signature. Then chip and PIN methods were
used, and more recently contactless methods have been introduced.
Discuss the effectiveness of using these different methods to improve security when paying
for goods.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
© UCLES 2020
06_0417_11_2020_1.13
[8]
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
© UCLES 2020
06_0417_11_2020_1.13
™
Cambridge IGCSE
*1018410769*
INFORMATION AND COMMUNICATION TECHNOLOGY
Paper 1 Theory
0417/12
May/June 2020
2 hours
You must answer on the question paper.
No additional materials are needed.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
This document has 16 pages. Blank pages are indicated.
06_0417_12_2020_1.15
© UCLES 2020
[Turn over
2
1
The 2020 Olympic Games committee is producing a database to show the medal winners in the
cycling events.
It is important that the correct data type is used in each of the fields.
(a) Tick (✓) the most appropriate data type for each of the following fields.
Boolean
(✓)
Numeric
(✓)
Text
(alphanumeric)
(✓)
Athlete_name
Gold_medal (Y/N)
Age
Name_of_country
[4]
© UCLES 2020
06_0417_12_2020_1.15
3
(b) A report has been produced that shows the male gold medal winners from the past three
Olympic Games.
Write down six of the formatting features that have been used in the report.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
5.........................................................................................................................................
...........................................................................................................................................
6.........................................................................................................................................
...........................................................................................................................................
[6]
© UCLES 2020
06_0417_12_2020_1.15
[Turn over
4
2
(a) Write down the type of interface shown.
...........................................................................................................................................
[1]
(b) Write down two disadvantages of using this type of interface.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
© UCLES 2020
06_0417_12_2020_1.15
5
3
Complete the following sentences using the most appropriate network term.
A communication method that wirelessly connects a mobile phone to a car, to allow hands-free
use of the mobile phone is ........................................... .
A network device that allows a stand-alone computer, using a dial-up analogue connection, to
connect to an ISP is a .......................................... .
A network device that allows a LAN to connect to the internet is a ........................................ .
A wireless communication method used in WLAN is ......................................... .
[4]
4
A teacher is creating a spreadsheet that will record the grades students achieved in recent tests
and compare the average grades of these tests with the students’ forecast grades. The grading
the teacher is using awards 1 for the highest grade down to 10 for the lowest. The teacher has
created a validation rule on the grade entered.
(a) Give examples of data used to test the validation rule. Your answers for abnormal test data
must be for a different reason in each case.
Type of test data
Example of test data
Normal
Abnormal
Abnormal
Extreme
[4]
© UCLES 2020
06_0417_12_2020_1.15
[Turn over
6
(b) Part of the spreadsheet is shown, column G subtracts the Forecast grade from the Average
grade.
(i)
Describe the steps the teacher can take to edit the spreadsheet to prevent new data
being typed into the Forecast grade column.
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
[5]
(ii) The teacher has typed a formula in cell E3. The formula is ROUNDUP(AVERAGE(B3:D3),0)
Explain, in detail, what the formula does.
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
© UCLES 2020
06_0417_12_2020_1.15
[4]
7
(c) The teacher has produced a graph showing the differences between the forecast grade and
the average grade for each student. The graph looks like this.
Describe the steps taken to create the graph. Include in your answer three improvements that
could be made to the graph.
Method...............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Improvement 1...................................................................................................................
...........................................................................................................................................
Improvement 2...................................................................................................................
...........................................................................................................................................
Improvement 3...................................................................................................................
...........................................................................................................................................
[6]
© UCLES 2020
06_0417_12_2020_1.15
[Turn over
8
5
When using the internet, FTP can be used.
Explain what is meant by the term FTP.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
6
[2]
Smishing and phishing can affect the security of a user’s data.
(a) Compare and contrast smishing and phishing.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2020
06_0417_12_2020_1.15
[6]
9
(b) Describe the methods which can be used to help prevent phishing.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
7
[6]
Complete each sentence using the most appropriate output device from the following list.
3D printer
Buzzer
Dot matrix printer
Heater
Laser printer
LCD monitor
Light
Wide format printer
(a) The device that can produce prosthetic limbs is called a
...........................................................................................................................................
[1]
(b) The device that can output soft copy is called a
...........................................................................................................................................
[1]
(c) The device that can produce sound as its main output is called a
...........................................................................................................................................
© UCLES 2020
06_0417_12_2020_1.15
[1]
[Turn over
10
8
Tablet computers tend to be used more than desktop computers.
Describe the advantages and disadvantages of using a tablet computer rather than a desktop
computer.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
9
[6]
People rely heavily on microprocessor-controlled devices in the home.
(a) Describe two drawbacks in terms of lifestyle changes this has produced for the users of such
devices.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
© UCLES 2020
06_0417_12_2020_1.15
11
(b) Many of the microprocessor-controlled devices in our homes use WiFi connections.
Describe the benefits and drawbacks of using WiFi connections in this way.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[6]
10 Music scores can now be produced using computer systems and appropriate software.
Describe the features of this technology.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2020
06_0417_12_2020_1.15
[4]
[Turn over
12
11
A headteacher is planning to produce a presentation to showcase the school’s achievements.
(a) Describe two methods the headteacher could use to gather information about the requirements
of the target audience.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
(b) The presentation is to be shown on large monitors at the entrance to the school. The school
is planning to embed music into the presentation so that music could be played as the
presentation is shown.
Describe the steps the headteacher would need to take to play music in the background of
the slides.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2020
06_0417_12_2020_1.15
[4]
13
(c) After showing the presentation to the parents the headteacher wishes to use the presentation
to show to young children to encourage them to come to the school.
Describe the features that the headteacher must include to make the presentation meet the
needs of an audience of young children.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
12 (a) Describe repetitive strain injury (RSI) and explain what causes it.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(b) Give three ways of minimising the risk of RSI.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
[3]
© UCLES 2020
06_0417_12_2020_1.15
[Turn over
14
13 Modern laptop computers tend to use external solid state storage rather than external optical
storage.
Compare and contrast the use of solid state storage with the use of optical storage to store data.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2020
06_0417_12_2020_1.15
[8]
15
14 There are two types of storage within a computer, internal memory and backing storage.
Discuss the differences between internal memory and backing storage.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2020
06_0417_12_2020_1.15
[6]
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
© UCLES 2020
06_0417_12_2020_1.15
™
Cambridge IGCSE
*3929455569*
INFORMATION AND COMMUNICATION TECHNOLOGY
Paper 1 Theory
0417/13
May/June 2020
2 hours
You must answer on the question paper.
No additional materials are needed.
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
This document has 20 pages. Blank pages are indicated.
06_0417_13_2020_1.13
© UCLES 2020
[Turn over
2
1
There are two types of software: applications and system.
Tick (✓) the most appropriate type of software for each of the following.
Applications
(✓)
System
(✓)
Device driver
Linker
Photo-editing software
Spreadsheet
[2]
2
(a) Write down the type of interface shown.
m
Files - Message
Working_file
memo notes
File
Edit
Reply
photos
template3
View
Insert
Format
Reply to All
Tools
Actions
Help
Forward
Date:
From:
dave@testpro.com
To:
cheryl@testpro.com
26 March 2020
Time:
14:22
Subject: Files
Artwork - Notepad
File
Edit
Format
View
Help
Miscellaneous
Project1
...........................................................................................................................................
© UCLES 2020
06_0417_13_2020_1.13
[1]
3
(b) Write down two advantages of using this type of interface.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
3
A computer system is connected to a LAN and a WAN.
(a) Explain what a LAN is.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(b) Explain what a WAN is.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2020
06_0417_13_2020_1.13
[2]
[Turn over
4
4
Mason is the head of a year group at a school. Every term he needs to send to parents a report on
their child’s progress. This will include a written report and the percentage attendance over the
term.
Each term he loads the comments from his tutors into the word processing software. He then adds
the attendance data from the database. The report is then printed and sent to parents.
He has decided that in future he will use mail merge to print the reports.
(a) Give four advantages of using mail merge instead of typing the reports.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
[4]
(b) As it is entered, the data on the database is checked using validation routines. The percentage
attendance field uses a range check.
Describe, using the percentage attendance field, the steps that need to be taken to create this
validation routine.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2020
06_0417_13_2020_1.13
[4]
5
(c) Before the database can be implemented the validation routines need to be tested.
Describe, using the percentage attendance field, how the validation routine will be tested by
Mason.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
5
[4]
The use of laptop computers and tablet computers by people on the move is becoming very popular.
Describe four advantages of using a tablet computer rather than a laptop computer.
1 ................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
3 ................................................................................................................................................
..................................................................................................................................................
4 ................................................................................................................................................
..................................................................................................................................................
[4]
© UCLES 2020
06_0417_13_2020_1.13
[Turn over
6
6
The secretary of the Tawara Rowing Club is organising a presentation evening for its members. A
systems analyst is creating a database for the club to store the details of the members. She is also
creating a spreadsheet to show who is attending the presentation evening.
The systems analyst has set up the following fields for the database.
Name_of_person Date_of_birth
Membership
_type
Contact_email
Contact_phone_no
Year
Gender
_joined
Nor Kwa
2/4/2005
Social
n.kwa@rockict.com
03 2453 5673
2018
F
Adam Mazian
23/5/2003
Social
AdamM@abc.co.my
082 25 4689
2016
M
Ahmed Othman 12/03/2006
Junior
AOthman@cie.org
01223 432678
2018
M
Senior
Zara@cbc.cn
123 3267 9999
2010
F
Zara Png
1/12/1997
(a) For the following fields write down the most appropriate data type. Each data type must be
different. For any numeric field, specify the type of number.
Gender...............................................................................................................................
Membership_type..............................................................................................................
Year_joined........................................................................................................................
[3]
© UCLES 2020
06_0417_13_2020_1.13
7
(b) Design an online data entry form which could be used to enter the details of one member,
using all the fields shown in the table.
In your design include appropriate spacing for each field and navigational aids. Do not include
data in the form.
[8]
© UCLES 2020
06_0417_13_2020_1.13
[Turn over
8
(c) A spreadsheet has been created to show which members are attending the presentation
evening and who has paid.
Part of the spreadsheet is shown.
A
B
C
D
E
G
H
Type of
Number Total
Attending
member
attending owed
Paid
1
F
I
J
K
Tawara Rowing Club
2
Name
Family
name
Full
name
3
Nor
Kwa
Nor Kwa Social
Y
2
50 Y
Junior
10
4
Ahmed Othman
Ahmed
Junior
Othman
Y
3
30 Y
Senior
20
5
Zara
Png
Zara Png Senior
Y
1
20 N
Social
25
6
Adam
Mazian
Adam
Mazian
N
0
0 N
Social
Cost
$
Write down three of the formatting features that have been used in the part of the spreadsheet
shown.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
[3]
© UCLES 2020
06_0417_13_2020_1.13
9
(d) A formula has been created and placed in cell G3. The formula is:
IF(E3=''Y'',VLOOKUP(D3,J$3:K$5,2)*F3,0)
Explain what the formula does.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[6]
(e) The secretary needs to identify different types of members in the club.
Describe the steps he would take to sort the data by type of member so that Junior members
are at the top of the list.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2020
06_0417_13_2020_1.13
[3]
[Turn over
10
7
A train company is improving security on its journeys. They are planning to introduce a facial
recognition system for passengers using their trains.
(a) Discuss the advantages and disadvantages of using facial recognition systems rather than
manually checking tickets.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2020
06_0417_13_2020_1.13
[6]
11
(b) Facial recognition is an example of biometrics. Direct data entry devices can be in three forms.
One is biometrics. The second is contactless where the item being read does not touch the
reader. The third is physical where the item being read does touch the reader.
Tick (✓) whether the following are the most appropriate examples of biometrics or contactless
or physical direct data entry.
biometrics
(✓)
contactless
(✓)
physical
(✓)
RFID
Magnetic stripe
Retina scan
Voice recognition
[4]
8
One implication of using a computer system is that people can break the law by hacking into other
computer systems. Cultural, Ethical and Moral implications can also be issues.
Tick (✓) the most appropriate implication for each of the following statements.
Cultural
(✓)
Ethical
(✓)
Moral
(✓)
A student has changed the contents of a company website
without permission
Writing computer games that make fun of a country’s
religion
Using pictures in a document without acknowledging
copyright
Passing information to a rival company
[4]
© UCLES 2020
06_0417_13_2020_1.13
[Turn over
12
9
Lanfen has purchased a new computer. The computer has no internal storage. All the data is stored
in the cloud.
Compare and contrast computers that use cloud-based storage and computers that have internal
backing storage.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2020
06_0417_13_2020_1.13
[6]
13
10 The modern home relies heavily on microprocessor-controlled devices. One of the benefits is that
a worker is able to return home to a warm house having set the heater control to switch on at a
certain time.
(a) Describe four benefits in terms of lifestyle changes that this has produced for the users of
such devices.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
[4]
© UCLES 2020
06_0417_13_2020_1.13
[Turn over
14
(b) The worker has set the heater control to switch on at 16:00 for two hours.
Explain how the microprocessor can operate the automatic heater to turn on and off at the
correct times.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2020
06_0417_13_2020_1.13
[6]
15
11
Parallel running is a type of implementation.
Name and describe two other methods of implementing a new computer system. For each one
give an advantage and a disadvantage of this method. Your answers must be different in each
case.
Method 1...................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
Advantage 1..............................................................................................................................
..................................................................................................................................................
Disadvantage 1.........................................................................................................................
..................................................................................................................................................
Method 2...................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
Advantage 2..............................................................................................................................
..................................................................................................................................................
Disadvantage 2.........................................................................................................................
..................................................................................................................................................
[8]
© UCLES 2020
06_0417_13_2020_1.13
[Turn over
16
12 A student is undertaking research for his studies. He needs to find up-to-date information and has
decided to look for it using the internet.
Explain how he would check the reliability of this information.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2020
06_0417_13_2020_1.13
[6]
17
13 A school is planning to set up a student work files area. The school is considering allowing students
to log in to the student work files area either using the school’s intranet or the internet.
Discuss the advantages and disadvantages of using the school’s intranet rather than the internet
to access this student work files area.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2020
06_0417_13_2020_1.13
[8]
18
BLANK PAGE
© UCLES 2020
06_0417_13_2020_1.13
19
BLANK PAGE
© UCLES 2020
06_0417_13_2020_1.13
20
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
© UCLES 2020
06_0417_13_2020_1.13
INFORMATION AND COMMUNICATION
TECHNOLOGY
Paper 1 Theory
2019
Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education
* 3 3 1 9 9 6 4 2 0 5 *
0417/12
INFORMATION AND COMMUNICATION TECHNOLOGY
February/March 2019
Paper 1 Theory
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your centre number, candidate number and name in the spaces at the top of this page and on any
additional pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
Any businesses described in this paper are entirely fictitious.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 16 printed pages.
DC (KS/SG) 161532/4
© UCLES 2019
[Turn over
2
1
For each of the different statements, tick the most appropriate network.
WAN
(✓)
WLAN
(✓)
LAN
(✓)
A cabled network used in one building.
The internet is an example of this type of network.
Several networks connected together using a router.
This network is connected without cables.
[4]
2
Tick whether the following are examples of System Software or Applications Software.
System
Software
(✓)
Applications
Software
(✓)
Compiler
Word processing software
Spreadsheet software
Operating system
[2]
3
Command Line Interface (CLI) and Graphical User Interface (GUI) are examples of interfaces
found in computer systems.
Give two advantages of a computer having a GUI rather than a CLI.
1 ........................................................................................................................................................
..........................................................................................................................................................
2 ........................................................................................................................................................
..........................................................................................................................................................
[2]
© UCLES 2019
0417/12/F/M/19
3
4
A router is used in networks.
Describe how a router routes data packets.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [3]
5
An office worker is about to open an attachment but is worried it might contain a computer virus.
Explain what is meant by a computer virus.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [2]
6
Circle three items which are used as output devices.
Buzzer
CD/RW drive
Keyboard
LCD monitor
Speaker
Solid state drive
Trackerball
Web cam
[3]
© UCLES 2019
0417/12/F/M/19
[Turn over
4
7
The Tawara Tea Company supplies tea to its customers. The company has created a spreadsheet
to help its sales team to keep track of its orders.
The spreadsheet has two worksheets, named Products and Orders.
Part of the spreadsheet is shown below.
All prices and costs are displayed in Indian Rupee ₹.
Worksheet: Products
1
2
3
4
5
6
7
8
9
10
11
A
Tea code
272
347
348
349
3
5
6
7
8
9
B
Product name
Singbulli Champagne Oolong
Phuguri Supreme
Tumsong Supreme
Pussimbing Supreme
Phuguri
Goomtee
Risheehat
Makaibari Organic
Bannockburn
Chamong Organic
C
Price per unit
₹ 16.00
₹ 16.00
₹ 16.00
₹ 16.00
₹ 8.50
₹ 8.00
₹ 6.40
₹ 4.90
₹ 5.00
₹ 4.00
Worksheet: Orders
A
Order ID
124
124
124
124
124
125
125
125
1
2
3
4
5
6
7
8
9
B
Tea code
272
348
6
9
349
3
5
6
C
Quantity ordered
24
25
105
120
30
225
220
200
Cost
D
A salesman needs to create a formula to be placed in cell D2, in the Orders worksheet, that finds
the Price per unit of the tea, multiplies it by the Quantity ordered and then displays the result.
(a) Write a formula that needs to be entered in cell D2. This formula will be replicated down to
cell D9.
=
...................................................................................................................................................
............................................................................................................................................. [8]
© UCLES 2019
0417/12/F/M/19
5
The salesman has created a new worksheet called Receipt which automatically produces a receipt
for each order.
Worksheet: Receipt
B
A
C
Order ID Tea code Product name
272
124
Singbulli Champagne Oolong
348
Tumsong Supreme
6
Risheehat
9
Chamong Organic
349
Pussimbing Supreme
1
2
3
4
5
6
7
D
Quantity ordered
24
25
105
120
30
Total
E
Cost
₹ 384
₹ 400
₹ 672
₹ 480
₹ 480
₹ 2416
(b) Explain how he could format the Cost column (column E) to display the values in Indian
Rupees as shown.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
© UCLES 2019
0417/12/F/M/19
[Turn over
6
8
A drone is a remote controlled flying vehicle. A drone is being used to monitor floods in Mumbai.
(a) Complete the following sentences, using the most appropriate word or words from the list
below.
(i)
buzzer
joystick
monitor
pressure sensor
ROM
speaker
temperature sensor
video camera
The drone is microprocessor controlled with input from a
..................................................................................................................................... [1]
(ii)
Images of the floods are captured using a
..................................................................................................................................... [1]
(iii)
The images sent from the drone are displayed on a
..................................................................................................................................... [1]
(b) Name three advantages of using a drone to monitor the floods rather than collecting the data
manually.
1 .................................................................................................................................................
...................................................................................................................................................
2 .................................................................................................................................................
...................................................................................................................................................
3 .................................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2019
0417/12/F/M/19
7
9
Aadhya and her family are planning a visit to the Gir National Park and she is creating a web page
about the destination.
She has started writing some of the HTML but has made some mistakes.
<html>
<!-- Visit to Gir National Park -->
<head>
</head>
<title>The Gir National Park</title>
<body>
<table style= "width:100%">
<tbody style="background-color: #9acd32>
<tr>
<td rowspan="2"><img src="GIRNP.JPG" width="50" alt="image of an elephant">
</td>
<td><h1>The Gir National Park</h1>
<h3>A National Park of Gujarat</h3>
</td>
<td ><img scr="GIR-LOGO.JPG" alt="Logo for Gir National Park">
</td>
</tr>
<tr>
<td colspan="2" >This webpage is under construction.
</td>
</tr>
</tbody>
<table>
</body>
</html>
Write down four mistakes which would prevent this markup from working properly. Your answers
must be different in each case.
1 ........................................................................................................................................................
..........................................................................................................................................................
2 ........................................................................................................................................................
..........................................................................................................................................................
3 ........................................................................................................................................................
..........................................................................................................................................................
4 ........................................................................................................................................................
.........................................................................................................................................................................
[4]
© UCLES 2019
0417/12/F/M/19
[Turn over
8
10 An electric bus system is being considered for New Delhi. Passengers will use smart cards to
travel on the bus. They will have to add money to their smart card before they can travel.
(a) Compare and contrast the use of smart cards rather than using cash to pay for a journey.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
The new electric bus system will help to reduce the air pollution in the city. Sensors are used in the
system.
(b) Name a sensor that could be used to detect high levels of air pollution.
...................................................................................................................................................
............................................................................................................................................. [1]
© UCLES 2019
0417/12/F/M/19
9
(c) The sensor monitors the air pollution. When the air pollution reaches a certain limit, a message
is displayed on a street sign in the city to warn pedestrians and road users.
Describe the computer processing involved in this system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(d) Data from the sensor needs to be converted from analogue to digital before it is processed.
Explain the need for this conversion.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
© UCLES 2019
0417/12/F/M/19
[Turn over
10
11
The systems life cycle is shown. The Design, Evaluation, Documentation and Implementation
stages are missing.
Write these stages into their correct places.
Analysis
..........................
..........................
..........................
Development
and testing
..........................
[4]
© UCLES 2019
0417/12/F/M/19
11
12 Tawara High School has developed a new computerised system to timetable lessons and
examinations. The school needs the new system to be in use before the start of the new school
year. The school is planning to implement the new system using either direct changeover or
parallel running.
(a) Discuss the advantages and disadvantages of using direct changeover compared with
parallel running as a method of implementing the system.
In your answer name the method you would use, giving reasons for your choice.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [8]
(b) Describe four advantages of using computerised timetabling systems.
1 .................................................................................................................................................
...................................................................................................................................................
2 .................................................................................................................................................
...................................................................................................................................................
3 .................................................................................................................................................
...................................................................................................................................................
4 .................................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2019
0417/12/F/M/19
[Turn over
12
13 Aayush has been involved in an accident and has badly damaged his hand. A surgeon is
attempting to replace Aayush’s hand with a prosthetic hand.
Explain how the surgeon would use a 3D printer to create the prosthetic hand.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
14 A student has handed in her homework. One of the incorrect answers she gave was that encryption
could be used to stop an unauthorised person accessing a computer system.
(a) Explain what is meant by encryption and why it is used.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Identify a method which would help to prevent unauthorised access to a computer.
...................................................................................................................................................
............................................................................................................................................. [1]
© UCLES 2019
0417/12/F/M/19
13
15 Geographic Information Systems (GIS) use satellites.
Describe, using an example, how GIS can be used.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [5]
© UCLES 2019
0417/12/F/M/19
[Turn over
14
16 A programmer is developing a presentation of a new ICT solution for a conference and needs to
consider the audience.
(a) Using examples, explain why presentations and ICT solutions have to take into account the
type of audience.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) The programmer is concerned that the software used for the presentation will be copied by
the participants during the conference.
Describe how the software could be protected from illegal copying.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
© UCLES 2019
0417/12/F/M/19
15
17 Repetitive Strain Injury (RSI) is one of the health problems associated with the prolonged use of
computers.
(a) Describe RSI and what causes it.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) State two strategies for preventing RSI.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
© UCLES 2019
0417/12/F/M/19
[Turn over
16
18 Smartphones are being increasingly used by tourists when travelling overseas.
Discuss, using examples, the benefits and drawbacks of the use of smartphones by tourists.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
© UCLES 2019
0417/12/F/M/19
Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education
* 8 7 2 2 4 0 7 5 8 1 *
0417/11
INFORMATION AND COMMUNICATION TECHNOLOGY
October/November 2019
Paper 1 Theory
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
Any businesses described in this paper are entirely fictitious.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 13 printed pages and 3 blank pages.
DC (NF) 174147/4
© UCLES 2019
[Turn over
2
1
(a) Tick whether the following are examples of System software or Applications software.
System
()
Applications
()
A linker
A database
An operating system
An applet
[2]
(b) Tick whether the following are examples of Internal hardware or External hardware.
Internal
()
External
()
A monitor
RAM
Printer
Mouse
[2]
2
The introduction of computers into the workplace has had an effect on working patterns.
Name the most appropriate working pattern that matches the descriptions given below.
(a) Working fewer hours a week than full-time staff.
............................................................................................................................................. [1]
(b) Workers have some say in when they start and finish work but must work a full day.
............................................................................................................................................. [1]
(c) One full-time job is divided between two workers.
............................................................................................................................................. [1]
(d) A worker works the required hours but in a fewer number of days.
............................................................................................................................................. [1]
© UCLES 2019
0417/11/O/N/19
3
3
A manager of a company based in North America is planning a meeting with colleagues in
Australia. He could hold a video-conference or a face-to-face meeting. A face-to-face meeting is
when the colleagues attending the meeting are all together physically in one room.
(a) Give three advantages of holding a video-conference rather than a face-to-face meeting.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(b) Give three disadvantages of holding a video-conference rather than a face-to-face meeting.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
4
A public garden in Canada has a computerised greenhouse to grow rare plants.
(a) Name three sensors which would be used in a computerised greenhouse.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
© UCLES 2019
0417/11/O/N/19
[Turn over
4
(b) To maintain the environment the sprinkler system sprays water on the plants for four hours
each day.
Describe how a microprocessor uses the data from a timer to control the sprinklers in the
computerised greenhouse.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
5
People are buying smartphones rather than desktop computers.
Describe the differences between using a smartphone compared to a desktop computer.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
© UCLES 2019
0417/11/O/N/19
5
6
Compare and contrast Bluetooth and WiFi.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
© UCLES 2019
0417/11/O/N/19
[Turn over
6
7
You have been asked by your teacher to use a word processor to create a brochure for a new
intake of pupils. The brochure will consist of:
•
•
•
•
Images of the school taken from a digital camera.
Printed archive photographs.
Information about the school already stored as text files.
Information to be typed directly into the brochure.
(a) Describe the steps which you will need to take to create the brochure.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(b) When the brochure is being created, the word processing software automatically checks the
spelling of the text as it is typed in and may suggest alternative words.
Explain why the suggestions may not always be appropriate.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
© UCLES 2019
0417/11/O/N/19
7
The teacher wishes to send the brochure as an email attachment to all the head teachers of the
local primary schools.
(c) Explain why she would create an email group to include all the email addresses of the head
teachers.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(d) The head teacher has purchased a computer with a large monitor and speakers to display
information about the school. It is placed in the entrance of the school where visitors wait. You
have been asked to produce a set of presentation slides to show features of the school.
The head teacher has recorded an audio message which is to be included in the presentation.
Describe the steps that you would take to set up the audio message so that it plays as the
presentation runs.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
© UCLES 2019
0417/11/O/N/19
[Turn over
8
8
A company is planning to improve its computer system. They have employed a systems analyst
who is recording and analysing information about the current system.
(a) Describe why he needs to identify the inputs, processing and outputs of the current system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
The systems analyst recommends that new software is required. The analyst could either write
the software or purchase it off the shelf.
(b) Give two advantages to the company of purchasing off the shelf software for the new system.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2019
0417/11/O/N/19
9
9
Fabian runs a film club. He has created a spreadsheet to display information about the films he
shows. Part of the spreadsheet is shown.
Searches
1
2
A
3
4
5
6
7
8
9
10
11
12
Film_Title
La Ba Land
Wizard of Down under
The Turfs 6
Illusion 5
How to Train your Cat 3
Lost City of C
B
C
Year
Director
Film Type
2000
Year_Released
2009
1937
2018
2018
2019
2000
Director
David Challe
Stanley Leving
Jane Banbury
Jason Blair
Sean Bluel
Steven Red
D
=COUNTIF(B6:B11,C1)
Film_Type
Musical
Musical
Childrens
Action/Animation
Action
Action
(a) Using the example of COUNTIF(B6:B11,C1), explain how a COUNTIF function works.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) There are more than 50 rows in the spreadsheet. Fabian needs to be able to see the top five
rows at all times as he is scrolling down the spreadsheet.
State the steps he needs to take to ensure this happens.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
© UCLES 2019
0417/11/O/N/19
[Turn over
10
10 E-safety is very important when using the internet. It is very easy to accidentally reveal personal
data to others when using social networking sites.
(a) Describe three strategies, giving reasons for each one, which you would take to avoid
revealing personal information when using social networking sites.
Strategy 1 .................................................................................................................................
...................................................................................................................................................
Reason 1 ..................................................................................................................................
...................................................................................................................................................
Strategy 2 .................................................................................................................................
...................................................................................................................................................
Reason 2 ..................................................................................................................................
...................................................................................................................................................
Strategy 3 .................................................................................................................................
...................................................................................................................................................
Reason 3 ..................................................................................................................................
...................................................................................................................................................
[6]
(b) Confidential personal data is sensitive data.
Name three items of personal data that could be sensitive data.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2019
0417/11/O/N/19
11
11
When a student has finished working on an existing file, the software gives her two options, Save
and Save As.
(a) Explain two differences between Save and Save As.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
When files are saved on a computer they can be saved in other formats that can reduce their file
size.
(b) Give reasons why file sizes may need to be reduced.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
12 A company’s employees can have access to the internet and the company intranet.
Describe the differences between an intranet and the internet.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
© UCLES 2019
0417/11/O/N/19
[Turn over
12
13 Tick whether the following statements refer to 3D printers, Laser printers or Dot matrix printers.
3D
()
Laser
()
Dot matrix
()
This printer prints layer by layer
This printer is an impact printer
This printer is a form of ink jet printer
This printer produces high quality output quickly
[4]
14 Applications software can be installed on a computer’s hard disk but companies are increasingly
selling applications software that is stored in the cloud.
Discuss the advantages and disadvantages of using the cloud rather than a hard disk for
applications software.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
© UCLES 2019
0417/11/O/N/19
13
15 State two benefits to a company of using robots on car production lines.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
[2]
16 Expert systems are used to diagnose illness in patients.
Discuss the advantages and disadvantages of using an expert system to diagnose illness.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [8]
© UCLES 2019
0417/11/O/N/19
14
BLANK PAGE
© UCLES 2019
0417/11/O/N/19
15
BLANK PAGE
© UCLES 2019
0417/11/O/N/19
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
© UCLES 2019
0417/11/O/N/19
Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education
* 2 7 2 1 3 7 6 6 5 5 *
0417/12
INFORMATION AND COMMUNICATION TECHNOLOGY
October/November 2019
Paper 1 Theory
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
Any businesses described in this paper are entirely fictitious.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 14 printed pages and 2 blank pages.
DC (JC/CT) 174146/4
© UCLES 2019
[Turn over
2
1
A student is creating a test plan for a validation routine. The input to be tested is an integer between
1 and 10. Tick whether the following are the most appropriate examples of normal data, abnormal
data or extreme data.
normal
(✓)
abnormal
(✓)
extreme
(✓)
one
4
10
3.2
[4]
2
Tick whether the following statements relate to a command line interface (CLI) or a graphical user
interface (GUI).
CLI
(✓)
GUI
(✓)
This interface does not need a pointing device
This is an example of a WIMP interface
The user has to type in instructions
This interface takes up more memory in the computer
[2]
3
Complete the following sentences, using the most appropriate items from the list.
An app
Coding
A data projector
A linker
Pen drive
Quantum
cryptography
A TFT monitor
A touch screen
Vision
enhancement
Web cam
(a) ...................................................................... is an example of system software.
(b) ...................................................................... is an example of an output device that can also
act as an input device.
(c) ...................................................................... projects an image inside the headset of the user.
(d) ...................................................................... is a form of encryption of data.
© UCLES 2019
0417/12/O/N/19
[4]
3
4
This diagram shows a smartphone.
(a) Name three input devices found on a smartphone.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(b) Name one storage device which is available in a smartphone.
............................................................................................................................................. [1]
(c) Name two output devices found in a smartphone.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
5
People are buying laptop computers rather than desktop computers.
Give four advantages of using a laptop computer rather than a desktop computer.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
4 .......................................................................................................................................................
..........................................................................................................................................................
[4]
© UCLES 2019
0417/12/O/N/19
[Turn over
4
6
The computer technician at Tawara School is planning to set up ten new computers to be placed
in the staffroom to form a network. The network will not be connected to the internet. Assume the
school currently has no hardware or software for this network.
(a) State the steps that the technician would need to take to set up this network.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) The teachers have asked the head teacher if they can access the internet. The computer
technician will need to attach a router to the network.
Explain how a router works.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
© UCLES 2019
0417/12/O/N/19
5
(c) The school plans to connect some teachers’ laptops to this new network using WiFi.
Describe, in detail, how data is transmitted from the laptops to the new network.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
7
A
B
C
(a) Describe the steps required to transform shape A into shape B.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Describe the steps required to transform shape A into shape C.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
© UCLES 2019
0417/12/O/N/19
[Turn over
6
8
Files can be saved in a generic file format.
(a) Explain why generic file formats are needed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Complete the following sentences, using the most appropriate file format from the list below.
.css
.csv
.doc
.gif
.htm
.pdf
.png
.rar
.sdb
.xls
(i)
............................................... is a stylesheet used in the creation of web pages.
[1]
(ii)
............................................... is a generic archive file format.
[1]
(iii)
............................................... is a generic file format that stores still and moving images.
[1]
(iv)
............................................... takes data in the form of tables and saves it as text.
© UCLES 2019
0417/12/O/N/19
[1]
7
9
The director of a small airport has asked his airport manager to look into the punctuality of
departures. The manager obtained details of some of the departures on one day. He has created
a spreadsheet, which contains both the airport data and the times of departure. Part of the
spreadsheet is shown.
1
2
3
4
5
6
7
8
9
A
B
Airport code Airport name
ALG
Algiers
BKK
Bangkok
BXW
Bawean
DEL
Delhi
DOH
Doha
CPH
Copenhagen
GVA
Geneva
C
D
E
F
Scheduled
Actual time of Minutes Airport Destination Late / on
departure
time
departure
late
code
10 time
11
14:00
15:13
73 CPH Copenhagen L
12
14:15
17:40
205 ALG
L
Algiers
13
14:45
14:58
13 DOH Doha
L
14
14:45
14:48
3 DOH Doha
L
15
14:50
15:05
15 BKK
L
Bangkok
16
14:50
14:50
0 GVA Geneva
OT
17
14:50
14:59
9 BXW Bawean
L
18
(a) Write a formula that would be entered in cell F11 to display the letter L if the value in C11 is
greater than 0 or the letters OT if it is not.
= ................................................................................................................................................
............................................................................................................................................. [3]
(b) Write a formula, without using named ranges, that would be entered in cell E11. The formula
must be easy to replicate. It should display the name of the airport, using the Airport code
from cell D11 and the list of Airport names.
= ................................................................................................................................................
............................................................................................................................................. [6]
© UCLES 2019
0417/12/O/N/19
[Turn over
8
(c) The airport manager is producing a report of his findings to present to the director. The data
will change from day to day.
Before he can produce the findings he needs to enter a formula in cell F19 to count the
number of late departures from the airport.
A
B
C
D
F
E
Scheduled
Actual time of Minutes Airport Destination Late / on
departure
time
departure
late
code
10 time
11
14:00
15:13
73 CPH Copenhagen L
12
14:15
17:40
205 ALG
L
Algiers
13
14:45
14:58
13 DOH Doha
L
14
14:45
14:48
3 DOH Doha
L
15
14:50
15:05
15 BKK
L
Bangkok
16
14:50
14:50
0 GVA Geneva
OT
17
14:50
14:59
9 BXW Bawean
L
18
Late
19
6
On Time
20
1
21
Write the formula, without using a named range, to be entered in cell F19.
= ................................................................................................................................................
............................................................................................................................................. [3]
(d) Name the most appropriate type of chart/graph he could produce to show the proportion of
late departures and those that leave on time.
............................................................................................................................................. [1]
© UCLES 2019
0417/12/O/N/19
9
10 A company is purchasing a new printer. A choice has to be made between using a laser printer or
a dot matrix printer.
Discuss the advantages and disadvantages of using dot matrix printers rather than laser printers.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
© UCLES 2019
0417/12/O/N/19
[Turn over
10
11
Microprocessor-controlled devices in the home have had positive effects on people’s lifestyles.
One of the advantages of using these devices is that we can now set a cooker to switch on whilst
we are out so that we arrive home to a cooked meal.
(a) Apart from the use of cookers, describe the advantages of using microprocessor-controlled
devices in the home.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(b) Some home devices can be controlled remotely when away from home. These home devices
need to be connected to the internet.
Describe the disadvantages of connecting home devices to the internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
© UCLES 2019
0417/12/O/N/19
11
12 A sports club is planning a new computerised record keeping system to replace their manual
system.
(a) A systems analyst recommends that new software is required. The analyst could either write
the software or purchase it off the shelf.
Give two advantages to the sports club of the analyst writing the software.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Explain why it is better to use a computer to store the records rather than the manual system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
© UCLES 2019
0417/12/O/N/19
[Turn over
12
(c) The systems analyst recommends that the system is implemented using direct changeover,
but the sports club feel that parallel running should be used.
Describe direct changeover and parallel running, giving a different benefit and drawback of
using each method of implementation.
Direct changeover ....................................................................................................................
...................................................................................................................................................
Benefit ......................................................................................................................................
...................................................................................................................................................
Drawback ..................................................................................................................................
...................................................................................................................................................
Parallel running .........................................................................................................................
...................................................................................................................................................
Benefit ......................................................................................................................................
...................................................................................................................................................
Drawback ..................................................................................................................................
...................................................................................................................................................
[6]
© UCLES 2019
0417/12/O/N/19
13
13 Many companies that make microprocessors use robots to carry out the task rather than using
humans.
(a) Give three advantages of using robots to carry out the task.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(b) Give three disadvantages of using robots to carry out the task.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2019
0417/12/O/N/19
[Turn over
14
14 The internet is not controlled by any one single country. The internet is a very good communication
system, but it can also be seen as a security problem.
Discuss the benefits and drawbacks of policing the internet.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
© UCLES 2019
0417/12/O/N/19
15
BLANK PAGE
© UCLES 2019
0417/12/O/N/19
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
© UCLES 2019
0417/12/O/N/19
Cambridge Assessment International Education
Cambridge International General Certificate of Secondary Education
* 3 1 7 1 2 6 2 4 6 8 *
0417/13
INFORMATION AND COMMUNICATION TECHNOLOGY
October/November 2019
Paper 1 Theory
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
Any businesses described in this paper are entirely fictitious.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This syllabus is regulated for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 13 printed pages and 3 blank pages.
DC (JC/CT) 174201/2
© UCLES 2019
[Turn over
2
1
Complete the following sentences about input and output devices, using items from the list below.
dot matrix printer
driving wheel
MICR
motor
speaker
TFT monitor
touchpad
wide format printer
(a) An output device that is used to produce hard copy architectural drawings is a
............................................................................................................................................. [1]
(b) An input device that is used in a virtual reality system is a
............................................................................................................................................. [1]
(c) The inbuilt input device on a laptop is a
............................................................................................................................................. [1]
(d) An output device that is designed to output music is a
............................................................................................................................................. [1]
2
Tick whether the following are optical, magnetic or solid state storage media.
optical
(3)
magnetic
(3)
solid state
(3)
Hard disk
SD card
CD ROM
Memory stick
[4]
3
A smartphone has many uses, for example making and receiving telephone calls.
Give four other uses of a smartphone.
1 .......................................................................................................................................................
2 .......................................................................................................................................................
3 .......................................................................................................................................................
4 .......................................................................................................................................................
[4]
© UCLES 2019
0417/13/O/N/19
3
4
Explain the purpose of a router.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [2]
5
A student is using her computer to do her homework.
For each of the statements below, identify the health problem most likely to be associated with the
use of a computer and a possible solution to the problem. Your answers must be different in each
case.
Health problem
Possible solution
Reading from the
monitor in poor
lighting
Using a mouse for
prolonged periods
of time
Sitting too long in
one position
[6]
© UCLES 2019
0417/13/O/N/19
[Turn over
4
6
Many homes use microprocessor-controlled devices to improve people’s lifestyle. However, these
devices can also have a negative effect on lifestyle.
Explain the negative effects that microprocessor-controlled devices can have on lifestyle.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
© UCLES 2019
0417/13/O/N/19
5
7
The following is an external stylesheet which contains a number of mistakes.
body
{background-image:url('Camblogo.jpg');
background-color:#7g7d76
h1
{text-weight:bold;
font-size:42px
text-align:centre}
h2
{font-size:30px;
text-align:right;
text-decoration: underlined;
font-family:"Times New Roman", Times, serif}
Identify five errors which would prevent this stylesheet from working properly and, for each error,
write down a possible correction.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
4 .......................................................................................................................................................
..........................................................................................................................................................
5 .......................................................................................................................................................
..........................................................................................................................................................
[5]
© UCLES 2019
0417/13/O/N/19
[Turn over
6
8
An examiner has created a spreadsheet to calculate his travel and hotel expenses when he
attends meetings.
Part of the spreadsheet that he has created is shown below.
A
1
ID
2
3
4
5
2018/01
2018/02
2018/03
B
C
D
F
G
H
I
E
Departure date Return date Destination Distance Hotel per night Total cost for hotel Travel cost
10/01/2019 12/01/2019 Cambridge
15/02/2019 18/02/2019 Coventry
20/02/2019 22/02/2019 Manchester
702
400
149.8
$98.20
$83.40
$98.20
$196.40
$250.20
$196.40
$175.50
$180.00
$67.41
J
K
Distance
Distance
threshold
rate
greater than 400
$0.25
400 or less
$0.45
If the car mileage is greater than 400 km he gets paid $0.25 per km for the whole distance otherwise
he gets paid $0.45 per km for the whole distance.
(a) Write a formula, that is easy to replicate, to be placed in cell H2 that calculates the travel cost
for the meeting. Your formula must work even when the distance rates change.
= ................................................................................................................................................
............................................................................................................................................. [7]
(b) Write a formula, that is easy to replicate, to be placed in cell G2 that calculates the total cost
for the hotel for the meeting.
= ................................................................................................................................................
............................................................................................................................................. [2]
(c) When the spreadsheet is completed the examiner will need to list the details of all the
meetings where the distance is 400 km or greater.
Explain how the examiner would use a filter to achieve this.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
© UCLES 2019
0417/13/O/N/19
7
(d) A computer can be used to model scenarios.
Explain why computer models are used instead of creating the real thing.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
9
A restaurant keeps meals warm in an oven. The meals must be kept at a constant temperature.
A temperature sensor is used to check the temperature in the oven.
Describe the use of a microprocessor to control the temperature in the oven.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
© UCLES 2019
0417/13/O/N/19
[Turn over
8
10 Many ATMs now allow customers to deposit cash and cheques.
(a) Describe the inputs and processing involved in depositing a cheque using an ATM.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(b) Discuss the benefits and drawbacks, to the customer, of using ATMs to deposit cheques into
a bank account.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
© UCLES 2019
0417/13/O/N/19
9
11
During the analysis stage for a new computer system, the systems analyst could examine existing
documents.
(a) Name two other methods the systems analyst could use to research the current system. Give
one benefit and one drawback of each.
Method 1 ...................................................................................................................................
...................................................................................................................................................
Benefit ......................................................................................................................................
...................................................................................................................................................
Drawback ..................................................................................................................................
...................................................................................................................................................
Method 2 ...................................................................................................................................
...................................................................................................................................................
Benefit ......................................................................................................................................
...................................................................................................................................................
Drawback ..................................................................................................................................
...................................................................................................................................................
[6]
(b) When the new computer system has been produced, it will need to be tested. There are three
types of test data that can be used to test a system, normal, abnormal and extreme.
Explain what is meant by normal, abnormal and extreme test data.
Normal ......................................................................................................................................
...................................................................................................................................................
Abnormal ..................................................................................................................................
...................................................................................................................................................
Extreme ....................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2019
0417/13/O/N/19
[Turn over
10
Following testing and implementation, documentation needs to be produced.
(c) Tick three elements you would only find in technical documentation.
Tick
(3)
Program name
Glossary of terms
Frequently asked questions
Algorithm
How to print data
File structures
Error messages
List of variables
[3]
© UCLES 2019
0417/13/O/N/19
11
12 Ralph regularly uses social media websites to stay in contact with his friends.
(a) Describe four strategies that he could use to stay safe when using these websites.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
(b) Policing the internet has been discussed for many years.
Describe three reasons why the internet has not yet been policed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
© UCLES 2019
0417/13/O/N/19
[Turn over
12
13 Explain the following terms.
(a) HTTPS ......................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) URL ...........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
14 One example of wireless communication is Bluetooth.
Describe how computers can use Bluetooth to connect to a device.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
© UCLES 2019
0417/13/O/N/19
13
15 Biometrics are now commonly used to increase the security of computer system access.
Discuss the effectiveness of using biometric methods to increase security.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
© UCLES 2019
0417/13/O/N/19
14
BLANK PAGE
© UCLES 2019
0417/13/O/N/19
15
BLANK PAGE
© UCLES 2019
0417/13/O/N/19
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
© UCLES 2019
0417/13/O/N/19
INFORMATION AND COMMUNICATION
TECHNOLOGY
Paper 1 Theory
2018
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 6 0 9 4 4 3 2 1 6 0 *
0417/12
INFORMATION AND COMMUNICATION TECHNOLOGY
February/March 2018
Paper 1 Theory
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
Any businesses described in this paper are entirely fictitious.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 14 printed pages and 2 blank pages.
DC (NH) 148522/3
© UCLES 2018
[Turn over
2
1
Complete the following sentences, using items from the list below.
Applications
A bar code reader
A compiler
A CPU
Hardware
A monitor
A printer
A scanner
System
USB
(a) ................................................ software is designed to manage computer hardware.
[1]
(b) ................................................ software examples include word processing and spreadsheets.
[1]
(c) ................................................ produces output in the form of hard copy.
[1]
(d) ................................................ converts high-level language programs into machine code. [1]
2
Tick the most appropriate device for reading the details from the following media:
Optical
Mark
Reader
(3)
Magnetic
Ink
Character
Reader
(3)
Bar code
reader
(3)
Chip and
PIN reader
(3)
Debit card
Bank cheques
A candidate’s responses for
multiple-choice exam questions
A label on a can of soup
[4]
© UCLES 2018
0417/12/F/M/18
3
3
(a) Identify two uses of 3D printing that help doctors and patients in hospitals.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Identify two uses of holographic imaging that help doctors and patients in hospitals.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
4
CD, DVD and Blu-ray are types of optical storage media.
Tick the most appropriate optical storage medium for each of the statements.
CD
(3)
DVD
(3)
Blu-ray
(3)
Stores lower quality audio files
Has the highest storage capacity
The RAM version of this medium is used to
record and play recorded images at the same
time
Stores high definition movies
[4]
© UCLES 2018
0417/12/F/M/18
[Turn over
4
5
Describe the following file formats.
(a) .css ...........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) .htm ...........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
6
The Chennai Flood Defence Agency is concerned about the continued flooding of the Adyar river.
You have been asked to produce a flood defence model, using a spreadsheet, to show the normal
depth and the actual depth of the river.
Part of the flood defence model is shown.
A
1
B
C
D
Chennai Flood Defence - Adyar River
2
Measurement point
4 Thiru-Vi-Ka Bridge
5 Kotturpuram Bridge
6 Anna Salai Bridge
7 Alandur Road Bridge
8 Jawaharlal Bridge
9 River Bridge
3
Normal Actual
depth depth
(m)
(m) Warning
0.5
3.9 Alert
0.5
1.6
0.6
1.7
0.65
2
0.7
2.6
0.75
2.7
10
In the Warning column the model will display:
•
•
•
•
© UCLES 2018
‘Alert’ when the actual depth is above 2.5 m
‘Aware’ when the actual depth is between 1.5 m and 2.5 m
‘Safe’ when the actual depth is below 1.5 m
‘Error’ when abnormal data is entered.
0417/12/F/M/18
5
(a) Test data is entered in cell C4.
Complete the following test plan for the warnings.
Test data
3.4
1.9
Type of data
Expected Result
Normal
Extreme
Aware
Normal
Aware
Extreme
Aware
Normal
Safe
Abnormal
Error
[5]
(b) You need to enter a formula in cell D4. This formula will be replicated down to cell D9.
Complete the formula that would be used in cell D4.
=IF(C4>2.5, “Alert”, ...................................................................................................................
...................................................................................................................................................
[5]
(c) One of the users has incorrectly entered actual depth data into cells B4 to B9 rather than cells
C4 to C9.
Describe how you can amend the spreadsheet to prevent this from happening in the future.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2018
0417/12/F/M/18
[Turn over
6
(d) Part of the flood defence model is shown.
A
1
B
C
D
Chennai Flood Defence - Adyar River
2
Measurement point
Thiru-Vi-Ka Bridge
5 Kotturpuram Bridge
6 Anna Salai Bridge
7 Alandur Road Bridge
8 Jawaharlal Bridge
9 River Bridge
3
4
Normal Actual
depth depth
(m)
(m) Warning
0.5
3.9 Alert
0.5
1.6
0.6
1.7
0.65
2
0.7
2.6
0.75
2.7
10
You have been asked to produce a graph or chart to show both the normal level and the
recorded actual level at each of the bridges along the river. Include a legend and the names
of each of the bridges.
(i)
Name the most appropriate type of graph or chart to display this data.
.......................................................................................................................................[1]
(ii)
Describe how you would use the spreadsheet software to create the graph or chart.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
© UCLES 2018
0417/12/F/M/18
7
(e) The data will be collected from the river using a remote computer connected to sensors to
measure the data.
Explain why it is better to use this method rather than collecting the data manually.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
7
Tick the three most accurate statements regarding computer hardware.
Tick
(3)
CPU means Computer Processing Unit
Data in RAM is not lost when the computer is turned off
ROM is Read Only Memory
A printer is an input device
A touch screen can be an input device and an output device
The control unit is part of the CPU
The CPU is stored on the hard disk
A pen drive is an example of internal memory
[3]
© UCLES 2018
0417/12/F/M/18
[Turn over
8
8
A company called HotHouse Design has produced the following on-screen data entry form to input
data into a customer database.
HotHouse Design
Ref. No.
Name of customer
Telephone number
Email address
Work to be carried out
Submit
(a) Describe the changes that HotHouse Design could make to their form in order to improve its
design and make it more user friendly.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
© UCLES 2018
0417/12/F/M/18
9
Mail merged letters will be sent to customers.
(b) Describe how mail merge will be used to produce the letters.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
9
Websites that start HTTPS are secure websites. They use encryption when the data is transferred.
Explain what is meant by encryption.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[3]
© UCLES 2018
0417/12/F/M/18
[Turn over
10
10 The Mansa Cricket Club (MCC) is considering setting up an online forum to allow users to post
comments.
(a) Compare and contrast a moderated forum with an un-moderated forum.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) The cricket club considered other methods of allowing its spectators to comment on the
matches.
Tick the most appropriate method for each of these examples.
Blog
(3)
Wiki
(3)
Email
(3)
Interactive cricket club web page that can
be viewed and edited by users
An online journal written by the club
secretary
Transmission of messages sent directly to
the secretary of the cricket club
Club members cannot edit the comments
posted online
[4]
© UCLES 2018
0417/12/F/M/18
11
(c) The cricket club are designing a poster to publicise a match against a New Zealand XI. They
have produced the following poster. The space available for the image is 1.3 cm high by 1 cm
wide and the image is currently 26 cm high by 16 cm wide.
Mansa Cricket Club
Place
image
here
New Zealand XI
vs
Mansa Cricket Club
14th March 2018
at the Brabourne Stadium
The image on the right is to be used in the poster but it is too large.
Describe how to edit the image, without cropping, to fit into the space in the poster.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(d) The image used in the poster is copyright-free.
Explain why copyright legislation is needed for images.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2018
0417/12/F/M/18
[Turn over
12
11
There are two types of documentation, user and technical.
Tick the elements that are part of User documentation, Technical documentation or Both.
User
documentation
(3)
Technical
documentation
(3)
Both
(3)
Purpose of the system
Program listing
Input format
Error messages
Hardware requirements
[5]
12 Ananya is a student who is considering buying a new laptop computer. She visits the local store
and is offered the choice of a laptop with an internal solid state drive (SSD) or a laptop where she
can store her data in the cloud.
(a) Describe the benefits and drawbacks of using an SSD rather than the cloud to store her data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
© UCLES 2018
0417/12/F/M/18
13
(b) Ananya is planning to invite her friends to the local cinema and is going to send them an
email.
Explain why she uses an email group to do this.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
13 A school has a computer room containing some laptops and some desktop computers. The
headteacher must consider safety issues.
Identify three of these issues and for each one write down a method which would help the
headteacher minimise the risk. Each method must be different in each case.
Issue 1 ..............................................................................................................................................
..........................................................................................................................................................
Method 1 ...........................................................................................................................................
..........................................................................................................................................................
Issue 2 ..............................................................................................................................................
..........................................................................................................................................................
Method 2 ...........................................................................................................................................
..........................................................................................................................................................
Issue 3 ..............................................................................................................................................
..........................................................................................................................................................
Method 3 ...........................................................................................................................................
..........................................................................................................................................................
[6]
© UCLES 2018
0417/12/F/M/18
[Turn over
14
14 Ocean City is a port which handles a large number of shipping containers. Containers are
automatically transferred between ships, storage areas and lorries at the port. The whole system
is operated by robots.
Discuss the benefits and drawbacks of using robots in this type of operation.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
© UCLES 2018
0417/12/F/M/18
15
BLANK PAGE
© UCLES 2018
0417/12/F/M/18
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2018
0417/12/F/M/18
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
*2243105400*
INFORMATION AND COMMUNICATION TECHNOLOGY
Paper 1 Theory
0417/11
May/June 2018
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
Any businesses described in this paper are entirely fictitious.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 15 printed pages and 1 blank page.
06_0417_11_2018_1.18
© UCLES 2018
[Turn over
2
1
2
Complete the following sentences, using the most appropriate items from the list below.
A 3D printer
An ADC
A compiler
An interpreter A microphone
A monitor
A numeric keypad
A speaker
A switch
A USB
(a) ................................................ is a device used to input a PIN.
[1]
(b) ................................................ analyses and executes a program line by line.
[1]
(c) .................................................produces output in the form of solid objects.
[1]
(d) .................................................produces output in the form of sound.
[1]
Tick whether the following are examples of Magnetic tape, Blu-ray or DVD RAM.
Magnetic
tape
(✓)
Blu-ray
(✓)
DVD RAM
(✓)
Does not require a laser to read the data.
Uses serial access only.
Used to store and play HD movies.
Can store and read data at the same time.
[4]
3
A media company with branches around the world has recently opened a new branch in London.
The branch includes a number of different computer networks. Identify the most appropriate type
of network to answer each of the questions.
(a) The type of network used to connect the branch to its head office in New York is called a
...........................................................................................................................................
[1]
(b) The type of cabled network used to connect computers together in one of the offices is called a
...........................................................................................................................................
4
[1]
Circle the names of three devices which are used for input.
CD writer
Laser printer
Pen drive
Mouse
Speaker
Touch screen
Remote control
Wide format printer
[3]
© UCLES 2018
06_0417_11_2018_1.18
3
5
A geyser is a hot spring in which water occasionally boils, sending a tall column of water and steam
into the air. A temperature sensor is used to monitor the temperature near the geyser. The data
from the sensor is sent to a microprocessor.
(a) Explain why the data from the sensor has to be changed before it is read by the microprocessor.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(b) Describe five advantages of using sensors and microprocessors to monitor the temperature
in geysers rather than using manual methods.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 ........................................................................................................................................
...........................................................................................................................................
5 ........................................................................................................................................
...........................................................................................................................................
[5]
© UCLES 2018
06_0417_11_2018_1.18
[Turn over
4
6
Tick whether the following refer to moderated or un-moderated forums
moderated
(✓)
un-moderated
(✓)
All posts are held in a queue.
Posts are not policed.
This forum reduces the chance of offensive messages.
This forum stops several postings of the same topic.
[2]
© UCLES 2018
06_0417_11_2018_1.18
5
7
A student is producing a website for his history course. He has produced the following CSS. However,
he has made some mistakes in the coding.
h1 {color: #ff0000;
font-family: "Times New Roman", Times, serif
font-size: 30pt;
text-weight: bold;
text-align: centre;}
h2 {color: #000000;
font-family: Courier, Times, serif;
font-size: 14pt;
text-decoration: underlined;
text-align: justify;}
body [background-color: #ad88e6;]
table {border-color: #000000;
border-style: dot;
border width: 3px;}
tbody {background-color: #c6dde8;}
Write down six mistakes that have been made in the CSS and for each, give the correction. Your
answers should be different in each case.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
3 ...............................................................................................................................................
..................................................................................................................................................
4 ...............................................................................................................................................
..................................................................................................................................................
5 ...............................................................................................................................................
..................................................................................................................................................
6 ...............................................................................................................................................
..................................................................................................................................................
[6]
© UCLES 2018
06_0417_11_2018_1.18
[Turn over
6
8
A large organisation is introducing a new computer system.
Compare and contrast pilot implementation with phased implementation of the new system.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2018
06_0417_11_2018_1.18
[6]
7
9
A farmer has purchased a computerised milking system for her cows. She has asked a systems
analyst to create a database to store details of the cows being milked.
Examples of the details of the cows which will be stored are:
Breed_of_cow Date_of_birth Weight_of_cow Average_milk_yield Animal_passport_number
Holstein
25/02/2017
725.9
24.5
998/2017
Ayrshire
15/03/2016
715.0
20.1
972/2016
Jersey
25/02/2017
732.7
25.0
971/2016
Holstein
10/10/2016
715.0
25.0
765/2016
(a) Complete the following table by entering the most appropriate data type for each field.
For any numeric field, specify the type of number.
Field name
Data type
Breed_of_cow
Date_of_birth
Weight_of_cow
Average_milk_yield
Animal_passport_number
[5]
(b) State which field would be the most appropriate for the primary key.
...........................................................................................................................................
[1]
(c) A validation check is used when entering the animal passport number into the database.
Name and describe the most appropriate validation check that could be applied to this field.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2018
06_0417_11_2018_1.18
[2]
[Turn over
8
(d) The amount of milk each cow produces is currently recorded daily in a spreadsheet.
This is part of the spreadsheet.
A
1
B
C
D
Daily Milk Yield
2
3
971/2016
Animal Passport Number
4
5
Date of milking
Amount produced
Litres
6
7
26/04/2018
24.5
8
27/04/2018
23.2
9
28/04/2018
22.1
10
29/04/2018
25.1
11
30/04/2018
24.9
12
01/05/2018
24.7
13
02/05/2018
24.6
14
03/05/2018
23.9
15
04/05/2018
23.9
16
05/05/2018
23.8
You have been asked to produce a graph or chart to show the amounts of milk for the cow
with Animal Passport Number 971/2016.
Describe the steps you would use to produce a graph or chart of this data as a separate sheet.
Include in your answer the name of the new sheet.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2018
06_0417_11_2018_1.18
[6]
9
10 Carlos is designing a new computer system to replace an existing system.
(a) Tick four items which will need to be designed.
Tick
(✓)
Inputs to the current system.
Data capture forms.
Report layouts.
Limitations of the system.
Observation methods.
Improvements to the system.
User and information requirements.
Validation routines.
Problems with the current system.
File structure.
[4]
(b) Before the system is implemented it needs to be tested. Different types of test data are used
to test the system. An example of test data is live data.
Describe what is meant by live data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(c) Following the implementation of the system, technical documentation needs to be written.
Identify three components of technical documentation which are not found in user
documentation.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
© UCLES 2018
06_0417_11_2018_1.18
[Turn over
10
11
Expert systems are used by doctors.
(a) Describe how an expert system can be used to diagnose illnesses.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[5]
(b) Name two other applications of expert systems.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
12 A motor car company has some designers based in London and some in Beijing. The cost of travel
between the two cities is very high, so when they wish to meet to discuss new products they use
video-conferencing.
(a) The designers all have PCs with a keyboard and a mouse in order to take part in
video-conferencing.
Name three other devices used to input or output data which would be needed to take part in
the video-conference.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
© UCLES 2018
06_0417_11_2018_1.18
11
(b) Describe three potential problems of the designers using video-conferencing systems rather
than meeting in either London or Beijing.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(c) Documents that are sent between the two cities are encrypted.
Explain what encryption is and why it is used.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2018
06_0417_11_2018_1.18
[3]
[Turn over
12
13 Using computers can lead to a number of physical safety issues.
Describe four of these types of issue.
1 ................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
3 ................................................................................................................................................
..................................................................................................................................................
4 ................................................................................................................................................
..................................................................................................................................................
[4]
© UCLES 2018
06_0417_11_2018_1.18
13
14 Many computer systems use virtual reality.
(a) Explain what is meant by virtual reality.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(b) Name two pieces of hardware used in virtual reality systems.
1.........................................................................................................................................
2.........................................................................................................................................
[2]
15 A new electronic cricket scoreboard is being tested. It stores the number of runs scored by each
player during a cricket match. The designer of the scoreboard assumes that no player will score
more than 400 runs.
Describe each type of test data shown below giving an appropriate example.
(a) Normal
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(b) Abnormal
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2018
06_0417_11_2018_1.18
[2]
[Turn over
14
(c) Extreme
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
16 Describe the features of the following:
(a) Blog
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(b) Wiki
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2018
06_0417_11_2018_1.18
[2]
15
17 The number of people who now shop online has increased over the past few years.
Discuss the advantages and disadvantages to a customer of shopping online rather than travelling
to a mall to shop.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2018
06_0417_11_2018_1.18
[8]
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2018
06_0417_11_2018_1.18
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
*7525211269*
INFORMATION AND COMMUNICATION TECHNOLOGY
Paper 1 Theory
0417/12
May/June 2018
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
Any businesses described in this paper are entirely fictitious.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 15 printed pages and 1 blank page.
06_0417_12_2018_1.18
© UCLES 2018
[Turn over
2
1
A computer contains internal hardware.
Write down the most appropriate item of internal hardware to match the descriptions.
(a) This handles all the system instructions.
...........................................................................................................................................
[1]
(b) A printed circuit board that contains the main components of the computer.
...........................................................................................................................................
[1]
(c) This generates output to the speaker.
...........................................................................................................................................
[1]
(d) A type of memory where data is lost when the computer is switched off.
...........................................................................................................................................
2
[1]
Tick whether the following statements are examples of a 3D printer, a dot matrix printer or a laser
printer.
3D
(✓)
dot matrix
(✓)
laser
(✓)
A printer that uses toner.
A printer that uses continuous stationery.
A printer that can be used to make physical models.
A printer that prints layer by layer.
[4]
3
Tick the most appropriate type of network for each description.
LAN
(✓)
WAN
(✓)
WLAN
(✓)
A cabled network in a building.
A network that can use satellites.
A network that connects countries.
A network that uses wireless technology.
[4]
© UCLES 2018
06_0417_12_2018_1.18
3
4
The security of software and data is very important.
Complete the following sentences using the most appropriate word(s) from the list.
anti-spyware
chip reader
coding
a dongle
encryption
iris scan
a password
a PIN
quantum
cryptography
a token
(a) An electronic device that plugs into a computer and contains the key for a piece of software
is called
...........................................................................................................................................
[1]
(b) The scrambling of data is known as
...........................................................................................................................................
[1]
(c) A security process that uses photons to enable secure communication is called
...........................................................................................................................................
[1]
(d) A numeric code that is entered to enable payment to be made for a meal in a restaurant with
a debit card is called
...........................................................................................................................................
5
[1]
Circle two items which are used as external storage media.
CD RW
Hard disk
Monitor
Mouse
RAM
ROM
[2]
© UCLES 2018
06_0417_12_2018_1.18
[Turn over
4
6
You are a student creating a website for your IGCSE ICT revision work. You have produced some
HTML, but have not yet added the logo or merged the cells. You are aiming to produce the following
page.
Fig. 1
Part of the markup you have produced is:
...
<table>
<tr>
<td><h1>IGCSE ICT</h1></td>
</tr>
<tr>
<td><h3>Theory</h3></td>
<td><h3>Practical 1</h3></td>
<td><h3>Practical 2</h3></td>
</tr>
<tr>
<td><h3>2 hour<br>Theory exam</h3></td>
<td><h3>2.5 hour<br>Practical exam</h3></td>
<td><h3>2.5 hour<br>Practical exam</h3></td>
</tr>
</table>
Fig. 2
© UCLES 2018
06_0417_12_2018_1.18
5
(a) Write the HTML that would display the image called “Logo.jpg” as shown in Fig. 1. If the browser
cannot find the image, then the text “Tawara School Logo” will be displayed.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[5]
(b) The third line of HTML currently shown in Fig. 2 does not produce the title as shown in Fig. 1.
Write the HTML that would produce the title as shown in Fig. 1.
...........................................................................................................................................
...........................................................................................................................................
7
[2]
A farmer has purchased a computerised feeding system for her goats. A goat has an RFID tag
attached to its ear, which is recognised by the computer. The system uses a passive RFID tag.
(a) Describe how the RFID tag can be activated.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2018
06_0417_12_2018_1.18
[3]
[Turn over
6
(b) The system recognises the goat and therefore gives the correct feed to the animal.
Describe how RFID technology will be used to give the correct feed to the animal.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2018
06_0417_12_2018_1.18
[3]
7
QUESTION 8 STARTS ON PAGE 8.
© UCLES 2018
06_0417_12_2018_1.18
[Turn over
8
8
An auction company sells toys. It uses a spreadsheet to show each person’s items and the amount
of money the buyer and seller owe to the company.
Part of the spreadsheet is shown below.
A
1
B
C
D
E
F
Buyer’s
premium
Seller’s
commission
G H
I
J
Product
value
Commission
Auction: 18th July 2017
2
3
Name of Seller
4
5
Item
code
Item description
Valuation
Selling
price
6
608a
Double Decker bus toy
€
20.00
€
45.00
€
10.00 €
1.50
7
608b
Blackpool Balloon tram
€
25.00
€
45.00
€
50.00 €
2.00
8
608c
Blackpool Steam tram
€
25.00
€
40.00
€ 100.00
€
2.50
9
608d
James Bond Aston Martin € 250.00
€ 340.00
€ 250.00
€
4.17
10 608e
D457A Bulldozer (rare)
€ 300.00
€ 750.00
€ 500.00
€
6.25
11 608f
Fairground Attraction 1
€
40.00
€
30.00
€ 1000.00
€
8.00
12 608g
Fairground Attraction 2
€
40.00
€
40.00
13 608h
Fairground Attraction 3
€
40.00
€
50.00
The Buyer’s premium is 20% of the Selling price.
(a) Write a formula to display the Buyer’s premium in cell E6.
=.........................................................................................................................................
[2]
(b) The person selling the item pays a Seller’s commission on any item sold. This is calculated
using the Selling price and finding a match or the next value below in the table, in cells I6 to
J11.
Write a formula to display in cell F6, the Seller’s commission on the Double Decker bus toy.
This formula will be replicated down to cell F13.
=.........................................................................................................................................
...........................................................................................................................................
© UCLES 2018
06_0417_12_2018_1.18
[5]
9
(c) Describe how you could replicate the formula in cell F6 for each item.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(d) Before the auction begins, a hard copy brochure is produced showing information about the
items, data from the spreadsheet and images of some of the items.
Describe how this brochure is created.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2018
06_0417_12_2018_1.18
[5]
[Turn over
10
9
Automatic car parking systems built into cars are becoming more common. They allow the car to
park safely in a parking bay unaided. The car uses proximity sensors fitted to the front and rear of
the car to help it park. There are many advantages to using these sensors.
(a) State three disadvantages of using proximity sensors in this way.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(b) Modern-day drivers rely less on paper maps and more on satellite navigation systems (satnav).
Describe the inputs, outputs and processing of a satnav when used by a driver to reach a
destination.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2018
06_0417_12_2018_1.18
[4]
11
10 The European Space Agency (ESA) is building a new space telescope to orbit the Earth and search
for distant galaxies. The ESA is using computer controlled robots to build the lens of the telescope.
(a) Discuss the advantages and disadvantages of using computer controlled robots rather than
humans to build the lens.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[6]
(b) A new computer system will operate the space telescope; the new computer system is made
up of a number of modules.
Describe how the new computer system is to be tested before it is fully operational.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2018
06_0417_12_2018_1.18
[4]
[Turn over
12
(c) When the new system has been developed, both user and technical documentation have to
be written.
Name three components that are found in both technical and user documentation.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
11
When people use the internet they run the risk of their computers being infected by viruses.
A file, containing a virus, is downloaded from the internet.
(a) Describe the effects the virus could have on their computer’s hard disk.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(b) Explain another way the computer could have become infected with a virus.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2018
06_0417_12_2018_1.18
[2]
13
(c) An antivirus program is set to fully scan a computer for viruses once a day.
Describe how the antivirus software works during the scan.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
12 A company used to have video-conferences with its suppliers, but due to technical problems they
are considering running an audio-conference.
Describe the advantages of using audio-conferencing rather than video-conferencing.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2018
06_0417_12_2018_1.18
[4]
[Turn over
14
13 Tick four health issues associated with the continual use of computers.
Tick
(✓)
Virus
Backache
Electrocution
Fire
RSI
Tripping
Eye strain
Overheating
Headache
Heart attack
[4]
14 Some smartphones connected to the internet can allow the user to point their phone’s camera at
an object or image to display information about it on the phone’s screen. The object acts like an
item in a search engine. This is called augmented reality.
One example of its use is in mobile games, where the user tries to catch characters from the game
as the characters appear to walk in the streets.
Explain, using examples, other ways in which augmented reality could be used in everyday life.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2018
06_0417_12_2018_1.18
[4]
15
15 As banks reduce the number of branches due to the increased use of online banking system,
improved security of customer data is needed. Many banks are introducing biometric systems to
secure customer data.
(a) Explain, using examples, why biometric systems are more effective than other methods of
security.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(b) Adam is paying his bill in a restaurant using a contactless debit card.
Describe the computer processing involved in Electronic Funds Transfer (EFT) using contactless
cards.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2018
06_0417_12_2018_1.18
[4]
[Turn over
16
16 The owner of a gardening company is planning to create a database to store the details of all his
customers. He has the choice of using a flat file database or a relational database.
Discuss the advantages and disadvantages of using a relational database rather than a flat file
database.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
[8]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2018
06_0417_12_2018_1.18
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
*7718146976*
INFORMATION AND COMMUNICATION TECHNOLOGY
Paper 1 Theory
0417/13
May/June 2018
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
Any businesses described in this paper are entirely fictitious.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 16 printed pages.
06_0417_13_2018_1.15
© UCLES 2018
[Turn over
2
1
A computer contains internal hardware.
Write down the item of internal hardware from the list to match the descriptions.
CD ROM
Internal hard disk
Network card
RAM
ROM
Sound card
Touch screen
Trackerball
Video card
Wide format printer
(a) Stores the start-up instructions for the computer.
...........................................................................................................................................
[1]
(b) A magnetic medium that stores applications when they are not in use.
...........................................................................................................................................
[1]
(c) Memory where data is lost when the computer is turned off.
...........................................................................................................................................
[1]
(d) Generates images to display on the monitor.
...........................................................................................................................................
2
[1]
For each application tick the most appropriate type of computer to match the description.
Desktop
(✓)
Laptop
(✓)
Smartphone
(✓)
A computer that is only used in one place.
Must always be connected to an external power
source to work.
Small enough to fit into a pocket.
A mobile device with a large keyboard and display.
[4]
© UCLES 2018
06_0417_13_2018_1.15
3
3
Data can be input into computers using direct data entry.
Tick the most appropriate method of direct data entry for each statement.
MICR
(✓)
OMR
(✓)
OCR
(✓)
Used to read magnetic data on cheques.
Used to read car number plates.
Used when entering handwritten text.
Used to read multiple-choice examination responses.
[4]
4
Circle two items which are used as output devices.
3D printer
Magnetic tape
Microphone
Monitor
Sensor
Web cam
[2]
© UCLES 2018
06_0417_13_2018_1.15
[Turn over
4
5
A fish farm has a computer system that constantly monitors the quality of the water in its fish ponds.
The system uses sensors to carry out the monitoring.
(a) Name two sensors that could be used to monitor the quality of the water in the fish ponds.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(b) Name the device that is used to convert the data from the sensor into a form that could be
read by the computer.
...........................................................................................................................................
[1]
(c) Describe the role of the computer in monitoring the quality of the water in the fish ponds.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2018
06_0417_13_2018_1.15
[3]
5
6
Describe the following security issues.
(a) Phishing
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(b) Pharming
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(c) Smishing
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2018
06_0417_13_2018_1.15
[2]
[Turn over
6
7
Peta is designing a new logo for his computer club. It must fit into a space 15 mm square on the
club’s headed note paper. The logo must look like this:
He is using a graphics package and has started by producing a white 10 mm square with a black
border like this:
Describe, in detail, how he can complete the logo.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2018
06_0417_13_2018_1.15
[6]
7
8
A large farm uses a robotic system to milk and feed animals. Until recently this would have been
carried out by farm workers.
Discuss the advantages and disadvantages of using robotics in automated farms.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2018
06_0417_13_2018_1.15
[6]
[Turn over
8
9
A teacher is creating a web page in HTML to display on the school’s intranet.
All colour codes must be in hexadecimal. It has the following style sheet attached:
h1
{color: #ff0000;
font-family: Times, serif;
font-size: 30pt;
text-align: center;}
h2
{color: #0000ff;
font-family: Times, Helvetica, serif;
font-size: 24pt;
text-align: center;}
h3
{color: #00ff00;
font-family: Times, Helvetica, serif;
font-size: 14pt;
text-align: justify;}
body
{background-color: #ad88e6;}
table
{border-color: #000000;}
Having tested the web page the teacher needs to make some changes to the style sheet.
Write down the CSS to:
(a) edit style h1 so that the font is Comic Sans or, if not available, Arial or, if this is not available,
the browser’s default sans-serif font.
font-family: ........................................................................................................................
...........................................................................................................................................
[3]
(b) add markup to the table style to set a 3 pixel wide, dashed external border.
table {border-color: #000000; ...........................................................................................
........................................................................................................................................ }
[4]
(c) edit style h3 so that the colour is set to black.
h3 {color: ...........................................................................................................................
...........................................................................................................................................
© UCLES 2018
06_0417_13_2018_1.15
[1]
9
(d) add markup to the start of style h2 to display the text as bold.
h2 {....................................................................................................................................
...........................................................................................................................................
[2]
10 Magnetic tapes are traditionally used for backing up data on large computer systems. Liu works
from home and is considering either backing up her data on to magnetic tape or a pen drive.
Give three reasons why she may prefer to use a pen drive.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
3 ...............................................................................................................................................
..................................................................................................................................................
[3]
© UCLES 2018
06_0417_13_2018_1.15
[Turn over
10
11
When a system has been developed, two types of documentation are produced, technical and user
documentation.
(a) Explain why user documentation is needed.
...........................................................................................................................................
...........................................................................................................................................
[2]
(b) Explain why technical documentation is needed.
...........................................................................................................................................
...........................................................................................................................................
[2]
(c) Identify four components that are only found in user documentation but not found in technical
documentation.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
4 ........................................................................................................................................
[4]
© UCLES 2018
06_0417_13_2018_1.15
11
(d) Tick three evaluation strategies that need to be carried out following implementation of the
new system.
Tick
(✓)
Observe users operating the old system.
Compare the final solution with the original requirements.
Design the report layout.
Check user documentation to see if it is correct.
Interview users to gather responses about how well the new
system works.
Test the system works correctly.
Identify any necessary improvements that need to be made.
Design error handling.
[3]
12 There are two types of verification, visual and double data entry.
Explain the differences between visual verification and double data entry.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2018
06_0417_13_2018_1.15
[2]
[Turn over
12
13 An organisation is planning to train all staff online rather than by video-conference.
(a) Describe what is meant by a web-conference.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(b) Explain the differences between video- and web-conferencing.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
14 Continuous use of computers can lead to a number of health issues.
In the table there are some recommended ways to minimise specific health issues. For each way,
identify the most appropriate health issue it is trying to minimise.
Identified health issues must be different in each case.
Ways of minimising the health issue
Health issue
Use ergonomic keyboards.
Use fully adjustable chairs to give correct
posture.
Change to LCD screens from CRT screens.
Have the monitor at the correct height.
[4]
© UCLES 2018
06_0417_13_2018_1.15
13
15 Drones are unmanned flying vehicles that are used for commercial and leisure activities. Drones
are fitted with cameras to monitor situations.
A river has burst its banks following prolonged heavy rainfall. Explain why drones are used to help
monitor the situation.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
[4]
16 The manager of a large company wants to replace the company’s cabled LAN with a WLAN.
Describe the features of a WLAN.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2018
06_0417_13_2018_1.15
[6]
[Turn over
14
17 A small company makes toys and then delivers them to shops.
Throughout the day orders are received by the company from its customers. The office workers in
the finance department create and store an invoice for each order. They are too busy to be disturbed
from their work.
Delivery drivers receive copies of the invoices which they will pass on to their customers. The
drivers make a large number of deliveries per day and do not return to the office.
A systems analyst will research the current system and suggest improvements to be made.
(a) For each type of employee identified above, describe the most suitable method of collecting
information from them, giving a reason for your choice.
Office workers....................................................................................................................
...........................................................................................................................................
Reason..............................................................................................................................
...........................................................................................................................................
Delivery drivers..................................................................................................................
...........................................................................................................................................
Reason..............................................................................................................................
...........................................................................................................................................
[4]
© UCLES 2018
06_0417_13_2018_1.15
15
(b) The factory is based on one site and only has space for one production line. The company
has decided to computerise its production line. It will use direct changeover as the method of
implementing the new system.
Explain why the company would use this method rather than other methods of implementation.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2018
06_0417_13_2018_1.15
[4]
[Turn over
16
18 As more and more people use the internet at home to carry out transactions they are at risk of
downloading software that could corrupt files or copy credit card details.
Discuss the effectiveness, or otherwise, of using different methods of increasing the security of a
home computer.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
[8]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge
© UCLES 2018
06_0417_13_2018_1.15
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 5 1 5 5 9 3 2 1 2 9 *
0417/11
INFORMATION AND COMMUNICATION TECHNOLOGY
October/November 2018
Paper 1 Theory
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Any businesses described in this paper are entirely fictitious.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 15 printed pages and 1 blank page.
DC (SR/SW) 150186/3
© UCLES 2018
[Turn over
2
1
There are many types of input device. Complete the following sentences, using the most
appropriate item from the list below.
barcode reader
chip reader
graphics tablet
keyboard
microphone
mouse
numeric keypad
scanner
sensor
touch pad
(a) A device used to input sound is called a
.............................................................................................................................................. [1]
(b) A device used to enter a four-digit code when paying by debit card in a shop is called a
.............................................................................................................................................. [1]
(c) A pointing device commonly built into a laptop is called a
.............................................................................................................................................. [1]
(d) A device, used by designers and artists, which has a stylus for drawing applications is called a
.............................................................................................................................................. [1]
2
Tick whether the following activities relate to the use of email, electronic fax or both.
email
()
electronic fax
()
both
()
Can be used as a legal document
Allows video attachments to be added to the message
Requires a telephone number
Messages can be sent to a computer
[4]
3
Tick whether the following is a method of validation, verification or proof-reading.
validation
()
verification
()
proof-reading
()
Identifying spelling errors
Using a range check
Typing in data twice
Visually comparing data on screen with the
original source document
[4]
© UCLES 2018
0417/11/O/N/18
3
4
(a) Identify the paragraph formatting shown below
This is a compulsory paper consisting of
multiple choice, short answer
and structured questions. The
questions are set on all
sections of the syllabus
content.
.............................................................................................................................................. [1]
(b) Identify the paragraph formatting used for the second paragraph
This is a compulsory paper consisting of
multiple choice, short answer and
structured questions.
The questions are set on all
sections of the syllabus
content.
Each individual question is set within
separate contexts of ICT applications in
everyday life.
.............................................................................................................................................. [1]
(c) Identify the alignment used in this paragraph
This is a compulsory paper consisting of
multiple choice, short answer and
structured questions. The questions are
set on all sections of the syllabus
content. Each individual question is set
within separate contexts of ICT
applications in everyday life.
.............................................................................................................................................. [1]
(d) Identify the alignment shown below
This is a compulsory paper consisting of
multiple choice, short answer and
structured questions. The
questions are set on all sections of the
syllabus content.
.............................................................................................................................................. [1]
© UCLES 2018
0417/11/O/N/18
[Turn over
4
5
A music festival is attended by very large crowds each year. Large amounts of data are collected
by the organisers, who are planning to store it in the cloud.
(a) Give four advantages of storing the data in the cloud rather than using other storage methods.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
(b) The organisers are worried that there are drawbacks in storing data in the cloud.
Describe three disadvantages of using the cloud to store data rather than other storage
methods.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
© UCLES 2018
0417/11/O/N/18
5
6
A soccer club uses ICT to help analyse its players’ performance in a soccer game. The players use
wearable technology with GPS tracking systems. The data collected from the GPS is analysed by
a computer which then displays the results on the monitor at pitch side.
(a) Describe, in detail, how this system could work.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
(b) The wearable technology includes a number of sensors that continuously monitor the players.
Name two physical variables that could be monitored during the game.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(c) After the soccer game the data is printed.
Name a suitable type of printer the soccer club could use and give a reason for your choice.
Printer .......................................................................................................................................
Reason .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2018
0417/11/O/N/18
[Turn over
6
7
You have created a spreadsheet to display the Ultra Violet (UV) radiation level in Brazil, Argentina
and France for 2016.
A
1
2
3
4 Jan
5 Feb
6 Mar
7 Apr
8 May
9 Jun
10 July
11 Aug
12 Sept
13 Oct
14 Nov
15 Dec
16 Average
17
B
Brazil
C
12
11
9
7
5
5
5
7
9
10
12
12
8.67
D
Argentina France
9
9
7
4
3
2
2
4
5
7
9
10
E
1
1
3
4
6
7
7
6
4
2
1
0
The following graph was produced from some of the data.
14
12
10
8
6
4
2
0
Jan Feb Mar Apr May Jun July Aug Sept Oct Nov Dec
(a) Describe how this graph was created.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
© UCLES 2018
0417/11/O/N/18
7
(b) You are going to show the graph to a group of students in a Geography lesson.
Explain three improvements you could make to the graph to help it match the needs of the
audience.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(c) Write down the formula that should be entered into cell B16 to calculate the average UV level
for Brazil.
= ................................................................................................................................................
.............................................................................................................................................. [2]
© UCLES 2018
0417/11/O/N/18
[Turn over
8
(d) The spreadsheet has been updated to show the danger levels of UV radiation in Brazil.
1
2
A
B
C
D
E
F
Danger
Levels in
Brazil
Argentina France
Brazil
9
1
12 Extreme
9
1
11
7
3
9
4
4
7
3
6
5
2
7
5
2
7
5
4
6
7
5
4
9
7
2
10
9
1
12
10
0
12
8.67
3
4 Jan
5 Feb
6 Mar
7 Apr
8 May
9 Jun
10 July
11 Aug
12 Sept
13 Oct
14 Nov
15 Dec
16 Average
17
18 UV Index
1 Low
19
3 Moderate
20
6 High
21
8 Very High
22
11 Extreme
23
24
Using the table in cells A19 to B23, write down the formula entered in cell C4 to display the
corresponding danger levels in Brazil. This formula will be replicated down to cell C15.
= ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [5]
(e) The formula that has been written in part (d) needs to be replicated down to cell C15.
Describe how you could display the corresponding data for all the months for Brazil.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
© UCLES 2018
0417/11/O/N/18
9
8
Discuss the advantages and disadvantages of social networking rather than email as a
means of communication.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [8]
© UCLES 2018
0417/11/O/N/18
[Turn over
10
9
A health authority is planning to centralise its medical booking system. This will allow all medical
bookings such as doctors’ appointments and hospital appointments to be made online.
The health authority is considering whether to implement the system using Pilot Running or Direct
Changeover.
(a) Discuss the advantages and disadvantages of implementing this system using these
methods. Include in your answer the method you think the health authority should use, giving
a reason for your choice.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [7]
© UCLES 2018
0417/11/O/N/18
11
(b) The health authority has implemented the system and it is now in full use. Evaluation now
needs to take place.
For each of the following, identify two questions that could be asked in order to evaluate the
new system.
Efficiency ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Ease of use ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Appropriateness .......................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
© UCLES 2018
0417/11/O/N/18
[Turn over
12
The ambulances used by the health authority are fitted with RFID chips. These are
scanned when the ambulance approaches traffic signals. If the ambulance is on an
emergency call the lights automatically change to green.
(c) Describe, in detail, what happens when the ambulance approaches the traffic signals prior to
the computer instructing the traffic lights to change to green.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
(d) The traffic controller is considering changing to a number plate recognition system on all
traffic lights.
State the advantages and disadvantages of using RFID technology rather than number plate
recognition in this scenario.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
© UCLES 2018
0417/11/O/N/18
13
10 A company is setting up an online shopping website. Transactions using the website need to be
secure.
(a) Explain what is meant by Secure Socket Layer (SSL).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(b) Describe the features that you would look for in a browser to indicate it has a secure
connection to a website.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
11
Tick whether the following activities relate to an intranet, the internet or both.
intranet
()
internet
()
both
()
This is a restricted access system.
This system can use email for communication.
This is a public system.
[3]
© UCLES 2018
0417/11/O/N/18
[Turn over
14
12 Robotic systems are now widely used in the production of cars.
Describe the effects this has had on job roles and working conditions in a car production factory.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
13 Modern supermarkets have automated stock control systems, which use data from the checkouts.
Describe how food items can be ordered by an automated stock control system so they are
delivered before the stock in the supermarket runs out.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
© UCLES 2018
0417/11/O/N/18
15
14 An author is writing a new textbook about ICT. He has used a large number of images in the
document and wishes to send the document as an email attachment to his publisher, but the file is
currently too large.
Describe how he could reduce the size of the document without reducing the number of images.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
15 Web development layers are used when designing web pages. An example of one of the layers is
the presentation layer.
Name the other two web development layers.
1 .......................................................................................................................................................
2 .......................................................................................................................................................
[2]
© UCLES 2018
0417/11/O/N/18
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2018
0417/11/O/N/18
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 4 2 1 9 8 8 5 9 8 7 *
0417/12
INFORMATION AND COMMUNICATION TECHNOLOGY
October/November 2018
Paper 1 Theory
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
Any businesses described in this paper are entirely fictitious.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 13 printed pages and 3 blank pages.
DC (SC) 150187/3
© UCLES 2018
[Turn over
2
1
Tick whether the following are examples of applications software or system software.
applications
software
(✓)
system
software
(✓)
Control software
Compiler
Word processing
Device drivers
[2]
2
Complete the following sentences, using the most appropriate technology from the list.
a 3D printer
a dot matrix printer
a laser printer
a light sensor
a magnetic ink character reader
a microphone
an optical mark reader
a speaker
a web cam
a wide format printer
(a) A device that is most suited to being used to produce hard copy output in a general office
environment is called
.............................................................................................................................................. [1]
(b) The input device that reads the cheque number from a bank cheque is called
.............................................................................................................................................. [1]
(c) A device that outputs hard copy large architectural drawings is called
.............................................................................................................................................. [1]
(d) A device that outputs sound is called
.............................................................................................................................................. [1]
© UCLES 2018
0417/12/O/N/18
3
3
Pupils working on a science project use the school network to store and retrieve files. They log
onto the network using individual passwords.
(a) Abisha is using his name as his password.
Give two reasons why this is not a good idea.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Give two other pieces of advice the teacher should give regarding the management of
passwords.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
4
A school is setting up a new computerised system to manage many aspects of the school
administration.
(a) Describe how this system can be used to manage student registration and attendance.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
(b) Describe the benefits of using this system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
© UCLES 2018
0417/12/O/N/18
[Turn over
4
(c) The data from the registration system is saved in the school administration database.
The head teacher will need to check the attendance records for any student for any semester.
She will type in the Student_ID and the Semester (Autumn, Spring or Summer). After she has
done this the following data will appear on the same screen.
Field name
Student_name
Days_present
Number_of_lates
Number_absences
Parents_phone_number
Tutor_group
Design a suitable screen layout to display one record. It must have appropriate spacing for
each field, navigation aids and a space to type in search data. Do not include examples of
students.
[6]
© UCLES 2018
0417/12/O/N/18
5
A student record from the database is shown below.
Field name
Example Data
Student_ID
8543
Semester
Spring
Student_name
Kannur Rahul
Days_present
180
Number_of_lates
4
Number_absences
6
Parents_phone_number
01244878387
Tutor_group
11ABC
(d) Name an appropriate validation check that could be used for each of the following fields,
based on the data shown in the record.
Field name
Validation check
Semester
Number_of_lates
Parents_phone_number
[3]
5
Describe the benefits and drawbacks of using a Graphical User Interface (GUI) rather than a
Command Line Interface (CLI).
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
© UCLES 2018
0417/12/O/N/18
[Turn over
6
6
A Medical Authority in a large city is planning to centralise its medical booking system. This
will allow patients to make all of their doctors’ appointments, dental appointments and hospital
appointments online.
(a) Discuss the benefits and drawbacks to both the patients and the medical staff of this type of
system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [8]
(b) The Medical Authority creates many different types of documents including letters and
memos. Each of them is produced using its corporate house style.
Explain why corporate house styles are required.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
© UCLES 2018
0417/12/O/N/18
7
7
A student is setting up a database of information about volcanoes for a Geography project. The
following is part of the database.
Name_of_volcano
Country
Height
State
Last_eruption
Volcano_type
Usu
Japan
731
Active
2001
Stratovolcano
Tor Zawar
Pakistan
2237
Dormant
2010
Fissure
Datong
China
1882
Extinct
450
Cinder Cone
Changbaishan
China
2744
Active
1903
Stratovolcano
Stromboli
Italy
926
Active
2016
Stratovolcano
Tengchong
China
2865
Dormant
1609
Pyroclastic cone
Wudalianchi
China
597
Dormant
1721
Multi-coned
Operators such as AND, OR, NOT, LIKE, >, >=, <, <=, =, < > can be used to search the volcano
database. The search criteria for all the dormant volcanoes with a height of less than 1000 metres
would look like this:
State = “Dormant” AND Height < 1000
Use only the given operators and data to:
(a) write down the search criteria that will produce a list of all the volcanoes that are not extinct in
China that also last erupted before the year 1900.
...................................................................................................................................................
.............................................................................................................................................. [6]
(b) write down the names of the volcanoes that match the requirements of part (a).
...................................................................................................................................................
.............................................................................................................................................. [2]
(c) The data is sorted into ascending order of height.
Write down the name of the volcano which would now be in the first record.
...................................................................................................................................................
.............................................................................................................................................. [1]
© UCLES 2018
0417/12/O/N/18
[Turn over
8
(d) Drones are remote-controlled flying devices. Data can be collected by drones that fly through
the gas cloud of the volcano. The drones have sensors attached to them which send the data
to a computer. The computer analyses the data.
Discuss the benefits and drawbacks of using this method of measurement.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [7]
(e) Explain why the data collected by the sensors cannot be read directly by the computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
© UCLES 2018
0417/12/O/N/18
9
8
Spam emails are a problem for computer systems.
(a) Explain what is meant by a spam email.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(b) Explain why spam emails need to be prevented.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(c) Describe the methods which can be used to prevent spam emails.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
9
Describe how a router forwards data packets from one network to another.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [3]
© UCLES 2018
0417/12/O/N/18
[Turn over
10
10 A local railway company is considering introducing a new system for its passengers using e-tickets
on a smart phone. Before introducing this new system, analysis of the current system is required.
(a) Describe the steps that would be carried out in the analysis of the current system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
The e-ticket will link to a database containing personal data.
(b) Give two examples of personal data that could be stored.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(c) Details of each of the passengers have been entered into the database.
Give one reason why this data was verified on entry.
...................................................................................................................................................
.............................................................................................................................................. [1]
© UCLES 2018
0417/12/O/N/18
11
Proofreading is sometimes thought to be verification.
(d) Explain the difference between verification and proofreading.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
11
.PDF and .RTF are two file formats used for storing documents.
Describe the file formats and explain the differences between them.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [5]
© UCLES 2018
0417/12/O/N/18
[Turn over
12
12 HotHouse Design is a large design company. It has recently created a new web address for their
design portfolios. The web address is:
https://www.hothouse-design.co.uk/portfolios
(a) Describe the following parts of the web address.
https:// .......................................................................................................................................
...................................................................................................................................................
hothouse-design .......................................................................................................................
...................................................................................................................................................
.uk .............................................................................................................................................
...................................................................................................................................................
/portfolios ..................................................................................................................................
...................................................................................................................................................
[4]
(b) Hyperlinks are widely used in web pages.
Explain what is meant by a hyperlink.
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
13 Spreadsheets use functions, formulae and named ranges.
(a) Describe the term:
Function ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Formula ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2018
0417/12/O/N/18
13
(b) Explain why a named range is used in a spreadsheet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
14 Emails are a very popular way of communicating.
Tick four statements, relating to emails that are true.
Tick
(✓)
Emails can only be sent from a computer.
An email can be used to send a message to many
people at the same time.
It always takes a long time for an email to arrive.
All emails must have an attachment.
Attachments may have to be compressed to be
sent via email.
Emails can be used to send legal documents.
Every email has to be printed out.
In order to send an email back to the sender
without retyping the address, reply is used.
Email means extended mail.
Email attachments are always checked for viruses
before they are sent.
© UCLES 2018
0417/12/O/N/18
[4]
14
BLANK PAGE
© UCLES 2018
0417/12/O/N/18
15
BLANK PAGE
© UCLES 2018
0417/12/O/N/18
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2018
0417/12/O/N/18
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 0 1 6 0 6 9 9 8 7 6 *
0417/13
INFORMATION AND COMMUNICATION TECHNOLOGY
October/November 2018
Paper 1 Theory
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
Any businesses described in this paper are entirely fictitious.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 15 printed pages and 1 blank page.
DC (NF/SW) 150226/3
© UCLES 2018
[Turn over
2
1
Complete the following sentences, using items from the list.
3D printer
backing storage
CPU
hardware
RAM
ROM
scanner
software
touchscreen
wide format printer
(a) The core component in a computer that controls arithmetic operations is called a
.............................................................................................................................................. [1]
(b) The physical components of a computer are collectively called
.............................................................................................................................................. [1]
(c) The type of memory that is volatile is called
.............................................................................................................................................. [1]
(d) An output device that is also an input device is called a
.............................................................................................................................................. [1]
2
Tick the most appropriate device matching the statements.
Hub
(ü)
Switch
(ü)
Router
(ü)
Connects a LAN to a WAN.
Broadcasts data to all connected devices.
Connects two LANs.
Selects which device to send data to.
[4]
© UCLES 2018
0417/13/O/N/18
3
3
Tick three actions that should be carried out during validation.
Tick
(ü)
Re-reading the document
Performing a length check on the data
Re-entering the data
Performing a character check on the data
Performing a grammar check on the document
Checking for spelling
Checking the data is reasonable and sensible
Checking the data is 100% correct
[3]
4
A supermarket has a number of point of sale (POS) terminals. These terminals are linked to the
stock database. Goods are automatically ordered when the number in stock reaches or goes
below the reorder level.
(a) Name two input devices that would be found at a POS terminal.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Name two output devices that would be found at a POS terminal.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
© UCLES 2018
0417/13/O/N/18
[Turn over
4
(c) The manager is checking stock on the shelves and in the stock room. He notices that an item
has run out of stock. The database shows that the number in stock is above the reorder level.
Give three reasons why this could have happened.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
5
Peter owns a sports centre. He keeps records of all his customers. He needs to replace his current
system and has employed a systems analyst to organise the introduction of the new system.
One method of researching the current system is interviewing Peter.
(a) Describe three other methods of researching the current system.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2018
0417/13/O/N/18
5
The systems analyst decides that the new system needs a screen input form to enter all the
personal data of each new customer.
(b) Describe three items of personal data for new customers that would be entered using the
form.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(c) Some users of the system struggle to complete the form due to problems with their eyesight.
You have been asked to design a screen input form to help these users.
Describe four features that you would include in your form to help these users complete it.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
(d) When the computer system has been created it needs to be implemented.
Name three methods of implementation.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
© UCLES 2018
0417/13/O/N/18
[Turn over
6
6
You are writing an essay on waterfalls using a word processor. You have found an image but it is
in landscape orientation and you have changed the orientation to portrait.
Before changing
After changing
(a) Describe the steps you took to make these changes.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
© UCLES 2018
0417/13/O/N/18
7
The existing document with your new image looks like this:
Waterfalls
(b) Describe how you could add another new image that you have found on the internet to the
document so the text appears alongside it and beneath it like the existing document.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
7
A piece of software has been created and is protected by copyright legislation.
(a) Explain the need for copyright legislation.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
© UCLES 2018
0417/13/O/N/18
[Turn over
8
(b) Software houses have ways of preventing software copyright being broken.
Describe four ways that the software houses can help to prevent copyright being broken.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
8
Digital cameras are becoming smaller and more widespread. They can be used in a number of
positive ways, for example:
They are used in medical operations to film internal organs without the need for major surgery.
They are used in wildlife situations where a large camera would be too noticeable.
They are used in sporting events like car racing to increase the viewer’s excitement of the race.
They are used in drones to film the extent of flooding in remote districts.
Describe some ways digital cameras can be used which would cause people to think that their
privacy is being invaded.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
© UCLES 2018
0417/13/O/N/18
9
9
A London based radio company is planning to cover the Commonwealth Games in Australia. Their
staff will hold video-conferences with the games organisers.
(a) Describe what is meant by video-conferencing.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
(b) Describe four disadvantages to the radio company of using video-conferencing rather than
face-to-face meetings in this scenario. A face-to-face meeting is when the staff attending the
meeting are all together physically in one room.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2018
0417/13/O/N/18
[Turn over
10
10 A school is voting to see if they should change the timings of the school day or not. You have
been asked by the head teacher to present the data from a number of opinion polls in the form
of a graph. The data shows the changes in people’s opinions over time. The data is stored in a
spreadsheet. Part of the spreadsheet is shown.
A
1
2
3 01/10/2018
4 03/10/2018
5 06/10/2018
6 08/10/2018
7 09/10/2018
8 11/10/2018
9 14/10/2018
10 16/10/2018
11 18/10/2018
12 20/10/2018
13
B
For
45
41
43
40
43
41
52
41
42
44
C
D
Opinion Poll
Against
38
41
40
42
40
41
32
42
41
41
E
F
G
Don’t know
17
18
17
18
17
18
16
17
17
15
(a) Name the most appropriate type of graph or chart that would be used to present the data.
.............................................................................................................................................. [1]
(b) The head teacher wishes the data to be presented as a graph to be shown at a public meeting.
He requires a legend to be included in the graph.
Describe how you would produce the graph or chart of the data including the legend.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [5]
© UCLES 2018
0417/13/O/N/18
11
11
Security of data is a major concern for people using computer systems. One method of protecting
the data is to use a strong password. This is an authentication technique.
(a) Name three other authentication techniques that could be used.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(b) A typical data protection act tries to protect the data of living individuals. One way of achieving
this is by keeping data secure.
Identify four other principles of a typical data protection act.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
12 A Command Line Interface (CLI) is found in a computer system.
Describe the drawbacks of using a CLI.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [3]
© UCLES 2018
0417/13/O/N/18
[Turn over
12
13 Ana is the planning officer for car parking in Rio de Janeiro city centre. She is planning to upgrade
the computerised parking meters. The new parking meters need to be tested. The cost of parking
is shown below:
Parking Charges
R$2 up to 2hrs parking
R$4 up to 5hrs parking
R$10 up to 24hrs parking
Maximum parking time is 24hrs.
The customer enters money into the machine and then pushes a button to print a ticket. If a
customer enters more money than the charge for a time period, but less than the amount of
money stated for the next time period, then a ticket is produced for the lower amount of time but
no money is given back. Assume that R$2 is the lowest charge and R$10 is the highest charge.
(a) Explain what is meant by the following three types of test data, using examples of the parking
charges.
Normal ......................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Abnormal ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Extreme ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
Having tested the system with normal and abnormal data Ana needs to test with live data.
(b) Explain what is meant by live data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
© UCLES 2018
0417/13/O/N/18
13
14 A company is concerned that hackers may gain access to its computer system or that it may be
infected by a virus.
(a) Explain what is meant by a virus and how it affects the operation of a computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
(b) When hackers gain access to a computer system they could install key-logging software.
Explain how key-logging software works.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
© UCLES 2018
0417/13/O/N/18
[Turn over
14
15 A student is carrying out some research using the internet but is concerned about the reliability of
some of the information he has found.
(a) Explain how he would assess the reliability of the websites where he has found information.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [6]
© UCLES 2018
0417/13/O/N/18
15
(b) Apart from the reliability of information, discuss the benefits and drawbacks of students using
the internet to carry out research.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [8]
© UCLES 2018
0417/13/O/N/18
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2018
0417/13/O/N/18
INFORMATION AND COMMUNICATION
TECHNOLOGY
Paper 1 Theory
2017
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 4 2 1 6 6 8 7 2 4 5 *
0417/12
INFORMATION AND COMMUNICATION TECHNOLOGY
February/March 2017
Paper 1 Theory
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 14 printed pages and 2 blank pages.
DC (KN/SW) 134901/3
© UCLES 2017
[Turn over
2
1
Complete the following sentences, using items from the list below.
a bar code reader
a chip reader
a laser printer
a magnetic ink character reader
a microphone
a PIN pad
a retina scanner
a touch pad
(a) A device that reads black and white lines on a product is called
...............................................................................................................................................[1]
(b) A device that inputs the sound made by a human voice is called
...............................................................................................................................................[1]
(c) A device which is used to read the data from the bottom of bank cheques is called
...............................................................................................................................................[1]
(d) An input device used to input the biometric details of the eye is called
...............................................................................................................................................[1]
2
Tick whether the following are examples of internal memory or backing storage.
internal memory
(✓)
backing storage
(✓)
Random Access Memory
Portable hard disk
Pen drive
Magnetic tape
[2]
3
Tick whether the following statements about networks are true or false.
true
(✓)
false
(✓)
A hub is a central computer.
A router connects a LAN to the internet.
A bridge connects a WAN to a LAN.
A switch connects computers in a network.
[2]
© UCLES 2017
0417/12/F/M/17
3
4
The manager of a restaurant uses a database to store data about the food the restaurant uses.
Part of the database is shown below.
Food_type
Packs_in_stock
Last_order_received
Re-order
Lentils
68
06/03/2017
N
Rice
54
10/03/2017
Y
Flour
19
01/02/2017
Y
Ghee
34
05/03/2017
Y
Below is a list of data types. Next to each one write down the field name which most closely
matches that data type. Each answer must be different.
Date ................................................................................
Text .................................................................................
Boolean ..........................................................................
Numeric ..........................................................................
5
[4]
Describe how security can be improved in a WiFi network.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[2]
6
Sukhjit has just discovered a large amount of spam emails in her inbox and is worried it may be a
phishing attempt.
(a) Explain some other dangers of opening spam emails.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2017
0417/12/F/M/17
[Turn over
4
Spam is sometimes associated with phishing emails.
(b) Describe how Sukhjit would recognise a phishing email.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
7
Explain the purpose of an intranet.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[3]
© UCLES 2017
0417/12/F/M/17
5
8
Describe how an expert system can be used to suggest car engine fault diagnoses.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[5]
9
Dhanesh has accidentally downloaded a file containing a virus.
(a) Describe the possible effects on Dhanesh’s computer system if he opens the file.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Describe how Dhanesh can help prevent his computer from downloading viruses from the
internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2017
0417/12/F/M/17
[Turn over
6
10 Bank cheques are sometimes used to pay bills.
(a) Name four pieces of information that the bank’s computer may read from the bank cheque.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
4 ................................................................................................................................................
[4]
(b) Describe what is involved in the clearing of bank cheques which the bank has collected in the
course of the day.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2017
0417/12/F/M/17
7
11
A teacher has asked you to use a word processor to create a table of some Indian cities together
with their populations. The required layout is shown below.
Populations of Indian cities
City
Population
City
Mumbai
New Delhi
Bangalore
Ahmedabad
Kolkata
Chennai
Population
(a) Describe how you would create this table in a word processor.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(b) When you have completed the table the teacher asks you to add some extra cities. You will
need to expand the table to add the extra cities.
Describe how you can do this.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2017
0417/12/F/M/17
[Turn over
8
12 Hot House Design require a new multimedia presentation for training sessions to be held in
Hyderabad.
(a) You have been asked to design a master slide for the presentation.
The slide must include the following details:
a labelled rectangular box to represent the Hot House Design logo;
a heading: Hot House Design Training;
a subheading with the name of the venue city;
the name of the trainer – Ranjit Desai;
slide number and date of meeting.
Use the space below to design a master slide for the presentation.
[5]
(b) The trainers will need to show the presentation and produce handouts for participants.
Name three output devices they would need.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
© UCLES 2017
0417/12/F/M/17
9
13 A teacher wants to record the results of tests for each student in a spreadsheet. He sets test
papers for both the theory (T) and practical (P) aspects of the ICT course.
Part of the spreadsheet is shown below.
A
2
3
4
5
B
C
D
E
F
G
H
I
J
K
Total
Student
Rajesh Patel
T
23
P
45
P
44
T
78
T
P
P Average mark
34 129 124
50
90
90
90 100 140 130
Grade
theory
mark
6
7
8
9
10
11 Max marks
(a) Write down a formula you would use in cell K4 which makes use of the labels in row 3, where
appropriate, to add up the marks for the theory tests only.
...............................................................................................................................................[4]
(b) Write down a formula that you would enter in cell I4 to calculate the average of Rajesh’s
results.
...............................................................................................................................................[2]
(c) Describe how the teacher could format the average mark to 2 decimal places.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2017
0417/12/F/M/17
[Turn over
10
2
3
4
5
G
H
I
P
P Average mark
129 124
68.14
J
K
Grade
Total
theory
mark
L
M
O
0 U
20 G
30 F
6
7
40 E
50 D
8
9
10
11
N
60 C
70 B
80 A
140 130
(d) The teacher wants the spreadsheet to calculate a student’s grade automatically.
He needs to calculate this from the average mark of all the results for the student.
Write down below a formula which should be entered into cell J4.
It should use the calculated average mark.
It will search for Rajesh’s average mark in column N and return the corresponding grade.
It should be easily replicated for other students.
...............................................................................................................................................[4]
14 When a system has been created documentation needs to be produced.
(a) Explain why technical documentation is needed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Explain why user documentation is needed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2017
0417/12/F/M/17
11
15 Part of a database report showing August temperatures in several cities in India is shown below.
Name of City
Max_temp
Min_temp
Kolkata
33
26
Chennai
34
26
Mumbai
31
26
Hyderabad
31
24
Allahabad
35
26
Describe how you would create a calculated field called temp_diff to show the difference between
the maximum and minimum temperatures.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[3]
16 3D printers are being used for producing personalised prescription drugs.
(a) Give two advantages of using 3D printers for this purpose.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Give two disadvantages of using 3D printers for this purpose.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2017
0417/12/F/M/17
[Turn over
12
17 Email is one method of communication that uses the internet.
(a) Explain the strategies that you could use to protect yourself and your computer whilst using
emails.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) When using the internet it is easy to accidently give your personal details to others.
Give two examples of personal data.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2017
0417/12/F/M/17
13
(c) Describe ways of protecting your personal data when using the internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
© UCLES 2017
0417/12/F/M/17
[Turn over
14
18 Many devices in the home can now connect directly to the internet.
Smartphones and computers used in the home can connect to the internet.
Discuss the benefits and drawbacks of using other devices that connect to the internet in the
home.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
© UCLES 2017
0417/12/F/M/17
15
BLANK PAGE
© UCLES 2017
0417/12/F/M/17
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2017
0417/12/F/M/17
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
*8515680477*
INFORMATION AND COMMUNICATION TECHNOLOGY
Paper 1 Theory
0417/11
May/June 2017
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
MODIFIED LANGUAGE
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 16 printed pages.
06_0417_11_2017_1.3
© UCLES 2017
[Turn over
2
1
Complete the following sentences using the most appropriate words from the list below.
hard disk drive
hardware
microphone
OCR
printer
scanner
screen
software
speaker
virus
2
(a) The physical components of a computer are called..........................................................
[1]
(b) The programs and data of a computer are called.............................................................
[1]
(c) The device used to input sound is called a.......................................................................
[1]
(d) The device used to store data is called a..........................................................................
[1]
Tick whether the following are examples of impact printers or non-impact printers.
impact
(✓)
non-impact
(✓)
Dot matrix printer
Inkjet printer
Laser printer
3D printer
[2]
3
Tick whether the following statements about internal and external memory are true or false.
true
(✓)
false
(✓)
A portable hard drive is an example of internal memory.
Magnetic tape is used to store backups of data.
RAM is internal memory.
ROM loses its data when the power is turned off.
[2]
© UCLES 2017
06_0417_11_2017_1.3
3
4
A new system has to be tested before it can be implemented. A variety of test data is used.
Name the following types of test data.
(a) Data that is outside the boundaries of acceptability.
...........................................................................................................................................
[1]
(b) Data that is on the boundary of acceptability.
...........................................................................................................................................
[1]
(c) Data that is not on the boundary but is within the range of acceptability.
...........................................................................................................................................
[1]
(d) Data that has been used before and has known outcomes.
...........................................................................................................................................
5
[1]
There are a number of health and safety issues associated with the use of computers.
Draw arrows from the terms Health or Safety to the matching issue. Use a maximum of four arrows.
Tripping over loose
wires.
Heavy equipment falling
off tables and injuring
people.
Health
Clicking a mouse
repetitively causing RSI.
Safety
Overloading sockets
causing fire.
[4]
© UCLES 2017
06_0417_11_2017_1.3
[Turn over
4
6
Validation is a way of checking data in a database.
Name the most appropriate validation check that matches each description below.
Makes sure that the data entered into a field is exactly 10 characters.....................................
..................................................................................................................................................
Makes sure that a number lies between 10 and 100................................................................
..................................................................................................................................................
Makes sure that the data entered is numeric............................................................................
..................................................................................................................................................
Makes sure that the date is entered as DD/MM/YYYY.............................................................
..................................................................................................................................................
[4]
7
Explain the meaning of the following terms used in document production.
Gutter........................................................................................................................................
..................................................................................................................................................
Header......................................................................................................................................
..................................................................................................................................................
Widow.......................................................................................................................................
..................................................................................................................................................
Wrapping...................................................................................................................................
..................................................................................................................................................
[4]
8
A company is setting up a video-conference.
(a) Name three computer hardware devices they would need.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
[3]
© UCLES 2017
06_0417_11_2017_1.3
5
(b) The company could have set up a web-conference rather than a video-conference.
Describe what is meant by a web-conference.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
9
[4]
An automatic washing machine contains a device to read RFID chips sewn into clothing. When an
item of clothing is placed in the washing machine it is scanned.
(a) Describe how the data is read from the RFID chip.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(b) Explain the benefits of using RFID technology in a washing machine.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2017
06_0417_11_2017_1.3
[2]
[Turn over
6
10 The city of Venice is in danger of being damaged due to rising sea levels. A new computer controlled
flood defence system is being planned. The developers of the system are using a spreadsheet to
model the plan.
(a) Give three reasons why computer models are used to simulate the flood defence system.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
[3]
(b) The city uses a manual system for detecting flood waters. This relies on people watching for
the rising levels of water.
Explain why creating a computerised system is better than using the manual system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2017
06_0417_11_2017_1.3
[4]
7
(c) The developers have used the results from the model to choose a computer controlled flood
defence system. It will have a barrier which can open or close.
Describe the role of the microprocessor in such a system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2017
06_0417_11_2017_1.3
[5]
[Turn over
8
11
Below is part of a spreadsheet of candidates’ examination grades. A teacher needs to create
formulae to analyse these grades. There are 64 grades in the full list, in cells B6 to B69.
A
1
B
C
D
E
F
G
Results for Centre XX123
2
3
Qualification: IGCSE
4
5
Cand. No
ICT
Totals
6
3001
E
A*
% A* - C
7
3002
C
A
% A* - G
8
3008
C
B
9
3012
D
C
10
3015
C
D
11
3017
C
E
12
3021
A
F
13
3024
E
G
14
3025
C
U
15
3026
E
X
16
3027
C
17
3028
D
(a) Write the most efficient formula that could be entered in cell E6 to display the number of A*
grades for ICT in the full list. The formula must be easy to replicate for the other grades.
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2017
06_0417_11_2017_1.3
[4]
9
(b) The teacher wants to copy the formula down to E15 without having to re-type any of the cells.
Describe how he could achieve this.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(c) The teacher needs to calculate the percentage of students gaining A* to C grades.
Write the most efficient formula to achieve this.
...........................................................................................................................................
© UCLES 2017
06_0417_11_2017_1.3
[4]
[Turn over
10
(d) The teacher wishes to create an appropriate chart or graph to be placed on a separate sheet.
It will show the grades and the corresponding total number of students gaining those grades.
Describe how the teacher could achieve this.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2017
06_0417_11_2017_1.3
[5]
11
12 The Staywell Community Centre has created a new database which stores the details of each of
its members. Each member can choose either swimming or tennis as an activity. The fields in the
database are name, address, contact number, gender and activity.
(a) When new members arrive at the centre they need to complete a paper-based form. Design
a suitable paper-based form to collect the member’s details and the activity they wish to book
for.
[5]
© UCLES 2017
06_0417_11_2017_1.3
[Turn over
12
(b) Describe four changes which could be made to this paper-based form to make it into an online
screen form.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
[4]
13 (a) A picture is an element of a web page. Name three other elements that could be used in a
web page.
1.........................................................................................................................................
2.........................................................................................................................................
3.........................................................................................................................................
[3]
A student is designing a web page about herself which she plans to publish on the internet.
The web page will contain a picture of herself as well as other details.
(b) She wants to place a picture ‘‘sport.jpg’’ on it.
Write the line of HTML markup to display the picture or to display the words ‘‘play sport’’ if the
browser cannot locate the picture.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2017
06_0417_11_2017_1.3
[2]
13
(c) She has been advised by her teacher that she needs to be aware of e-safety.
Describe the e-safety issues that she should be aware of before she publishes this web page.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2017
06_0417_11_2017_1.3
[4]
[Turn over
14
14 Computer operating systems have developed since early computers used Command Line Interfaces
(CLI). Many computers now use Graphical User Interfaces (GUI), some of which are capable of
using touch screen technology.
Compare and contrast CLI and GUI.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2017
06_0417_11_2017_1.3
[8]
15
15 You use a computer to do your homework. You are concerned about the health issues of using a
computer.
Discuss the advantages and disadvantages of different methods you could use to help minimise
the health problems of using the computer.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2017
06_0417_11_2017_1.3
[6]
[Turn over
16
16 Robots are being used in the mining industry to dig up minerals from under the surface of the Earth.
(a) Give three advantages of using robots rather than humans to do this task.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
[3]
(b) Give two disadvantages of using robots rather than humans.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2017
06_0417_11_2017_1.3
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
*8606559575*
INFORMATION AND COMMUNICATION TECHNOLOGY
Paper 1 Theory
0417/12
May/June 2017
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 14 printed pages and 2 blank pages.
06_0417_12_2017_1.2
© UCLES 2017
[Turn over
2
1
When a person buys goods in a supermarket they have to pay at the checkout.
(a) Identify two input devices used at the checkout.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
(b) Identify two output devices used at the checkout.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
2
Tick whether the following statements are true or false.
true
(✓)
false
(✓)
A router is required to allow a LAN to connect to the internet
A web browser displays a web page
An intranet has restricted access
ISP means Internal Service Provider
[2]
© UCLES 2017
06_0417_12_2017_1.2
3
3
Tick whether the following items are found in technical documentation or user documentation or
both.
technical
(✓)
user
(✓)
both
(✓)
Error messages
Hardware requirements
Program listing
Purpose of the system
[4]
4
Identify the image editing techniques described in the following statements.
(a) Remove unwanted parts of an image.
...........................................................................................................................................
[1]
(b) Make an image larger or smaller.
...........................................................................................................................................
[1]
(c) Format the text so that it flows around an image.
...........................................................................................................................................
[1]
(d) Turn an image a number of degrees clockwise or anti-clockwise.
...........................................................................................................................................
© UCLES 2017
06_0417_12_2017_1.2
[1]
[Turn over
4
5
The managers of a nuclear power plant need to check the radioactivity levels in a chimney stack
which needs to be demolished. They intend to use a robot. This device has sensors to read the
radioactivity levels.
(a) Explain why the data from the sensors cannot be read directly by the microprocessor and
name the device needed to change the data into a form that the microprocessor can understand.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(b) The managers have been told they can use this robot for other tasks by replacing the existing
sensors with different ones.
Give three advantages of using an existing robot device rather than developing a new one.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
6
[3]
A student has completed some work at school and wishes to take it home. He could use a pen
drive or a CD R disc to transport the files.
(a) Give two error messages that could appear to stop him saving his work.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2017
06_0417_12_2017_1.2
[2]
5
(b) Compare and contrast the use of a pen drive rather than a CD R.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
7
[4]
Driverless automobiles use a number of different methods to drive between two points.
(a) Name a sensor that could be used on the automobile to detect a person walking in front of it.
...........................................................................................................................................
[1]
(b) Modern automobiles contain electronic devices designed to help the driver.
Suggest three examples of labour-saving or safety devices in a modern automobile that use
sensors.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
[3]
© UCLES 2017
06_0417_12_2017_1.2
[Turn over
6
(c) Discuss the advantages and disadvantages of these devices in relation to automobile journeys.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
8
[6]
Expert systems are used in medical applications.
(a) From the list below, tick two components of an expert system.
tick
(✓)
Control unit
Graphics program
Inference engine
RFID
Rules base
Search engine
[2]
© UCLES 2017
06_0417_12_2017_1.2
7
(b) Describe three benefits of the doctor using an expert system to help diagnose a patient’s
illness.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
9
[3]
A school’s examinations officer has decided to develop a database to store pupil details and the
examinations they are due to sit next summer. They are going to use a relational database.
(a) Describe the steps involved in creating the database.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2017
06_0417_12_2017_1.2
[4]
[Turn over
8
(b) Some of the records stored in the database are given below.
Examination_ID
Name_of_subject
Examination_level
Date_of_exam
041731
ICT
IGCSE
12/04/2018
047822
Computer Science
IGCSE
11/06/2018
604312
Design and Technology O Level
01/06/2018
301532
French
28/06/2018
O Level
Based only on the examination details above, complete the table below, stating the most
appropriate data type for each field.
Field name
Data type
Examination_ID
Name_of_subject
Examination_level
Date_of_exam
[4]
(c) Write the search criteria to search for all examinations which will be sat after 26/06/2018, using
at least one of the following operators >, >=, <, <=, = .
...........................................................................................................................................
...........................................................................................................................................
[2]
(d) Apart from presence check, name and describe a suitable validation check for each of the
following fields in the database, based on the data shown in part (b).
Examination_ID.................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Date_of_exam...................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
© UCLES 2017
06_0417_12_2017_1.2
9
10 A leisure centre is creating membership cards for all its members. The membership card must
include a photograph of the member, the member’s name and membership number, the type of
member (Senior or Junior), their date of birth and gender.
(a) Use the space below to design the membership card.
[5]
(b) Describe all the steps involved in carrying out a mail merge to create the membership cards.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2017
06_0417_12_2017_1.2
[5]
[Turn over
10
11
The Xtreme Adventure Holiday Company are setting up a spreadsheet for their payroll. They have
job codes for each of their employees. Below is part of the payroll spreadsheet.
A
1
B
C
D
E
F
G
The Xtreme Adventure Holiday Company
2
3
4
5
Job codes
6
A
Administration/Office
7
B
Snowboard Instructor
8
H
Host/Hostess
9
S
Ski Instructor
10 SA
Senior Administrator
11 TA
Transport Assistant
12 TB
Trainee Snowboard Instructor
13 TM
Transport Manager
14 TS
Trainee Ski Instructor
15
16 Employees
17 Name
Job code
18 Luca Gisi
B
19 Livio Stager
S
20 Nico Gantert
B
21 Fabian Ging
S
22 Mattia Polt
S
23 Sofia Walp
H
24 Laura Haener
S
25 Alessandro Messerli
S
26 Lara Forrer
B
27 Arda Hegler
S
28 Simone Aebi
B
Job description
(a) Describe, giving a suitable name for the range (A6:B14), how the payroll manager could name
this range.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2017
06_0417_12_2017_1.2
[3]
11
(b) Write a formula for cell C18 to display the job description, using the named range from part (a).
...........................................................................................................................................
...........................................................................................................................................
[4]
12 When a new system is being developed analysis takes place. One method of researching the
current system is interviewing.
(a) List three other methods of researching the current system.
1.........................................................................................................................................
2.........................................................................................................................................
3.........................................................................................................................................
[3]
(b) Describe two drawbacks of using interviews.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2017
06_0417_12_2017_1.2
[4]
[Turn over
12
13 The introduction of computers in an organisation can both increase or decrease employment.
(a) Tick the jobs below for which the introduction of computers will increase the number of workers.
Job description
tick
(✓)
Car production workers
Delivery drivers
Payroll workers
Programmers
Typists
Website designers
[3]
(b) Describe what is meant by the following types of working.
Compressed hours............................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Flexible hours....................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
14 There are different ways to check the data that you have entered into a computer system. One of
these ways is verification.
(a) Name two types of verification.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
© UCLES 2017
06_0417_12_2017_1.2
13
(b) Proofreading is sometimes thought to be verification.
Explain the differences between verification and proofreading.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
15 Email systems can receive spam emails.
Explain why spam should be prevented.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2017
06_0417_12_2017_1.2
[2]
[Turn over
14
16 Bluetooth and WiFi can connect devices together.
Discuss the advantages and disadvantages of using Bluetooth or WiFi.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2017
06_0417_12_2017_1.2
[8]
15
BLANK PAGE
© UCLES 2017
06_0417_12_2017_1.2
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2017
06_0417_12_2017_1.2
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
*4354055157*
INFORMATION AND COMMUNICATION TECHNOLOGY
Paper 1 Theory
0417/13
May/June 2017
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
MODIFIED LANGUAGE
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 13 printed pages and 3 blank pages.
06_0417_13_2017_1.1
© UCLES 2017
[Turn over
2
1
Using the list, write down the most appropriate output device to produce the following.
3D printer
dot matrix printer
graph plotter
keyboard
monitor
mouse
speaker
SSD
(a) High resolution drawings in hard copy.
...........................................................................................................................................
[1]
(b) Sound from a computer.
...........................................................................................................................................
[1]
(c) A solid object.
...........................................................................................................................................
[1]
(d) Scenes from a video game.
...........................................................................................................................................
2
[1]
Tick whether the following statements are true or false.
true
(✓)
false
(✓)
An actuator is an item of software.
Hardware is the physical components of a computer system.
Software controls the operation of the computer.
A spreadsheet is an example of systems software.
[2]
© UCLES 2017
06_0417_13_2017_1.1
3
3
The following icons are used on the slides in presentation software.
Write down the most appropriate meaning for each icon.
Icon
Meaning
[4]
4
Different terms are used in document production.
Complete the following sentences.
(a) The unit used to measure the size of a font is called
...........................................................................................................................................
[1]
(b) A page can be portrait or landscape. This is called
...........................................................................................................................................
[1]
(c) The special margin that is placed at the top or edge to clear the text from the fold in a page is
called the
...........................................................................................................................................
[1]
(d) When the first line of a paragraph appears as the last line of a page this is called
...........................................................................................................................................
© UCLES 2017
06_0417_13_2017_1.1
[1]
[Turn over
4
5
People can manage their bank accounts in different ways. One way is telephone banking.
(a) A person wishes to use telephone banking without speaking to an operator to transfer money
from one bank account to another.
Describe the steps needed to do this.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[6]
(b) When a debit card is read by computer, data on the card can be used for transactions.
List four items of data found on a debit card which can be read by computer.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
4.........................................................................................................................................
...........................................................................................................................................
[4]
© UCLES 2017
06_0417_13_2017_1.1
5
6
Midwest School library has a database system. Students who borrow books present their library
cards containing their details. The librarian wishes to improve security by introducing biometric
methods.
(a) Name two direct input methods the cards could use.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
(b) Give two examples of biometric input.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
[2]
(c) Name and describe in detail the files the library database system would use.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2017
06_0417_13_2017_1.1
[4]
[Turn over
6
(d) The fields date_borrowed and date_due_back are contained in the database.
The date_due_back field is calculated from the date_borrowed field. The student can borrow
a book for 14 days.
Write a formula for the calculated field date_due_back.
...........................................................................................................................................
...........................................................................................................................................
7
[2]
A school is creating a spreadsheet as a method of recording academic performance of students in
IGCSE Geography.
The spreadsheet lists each student’s name and their target level. The levels range from 1 to 9,
where 9 is the best level.
Teachers enter the current working level. If the working level is the same or better than target level
then ‘‘well done’’ is displayed in the comment cell, otherwise ‘‘needs improvement’’ is displayed.
A
1
Name
2
Peter
3
Frances
B
C
D
E
Target
Level
Working
Comment
Level
Smith
9
6
Brown
5
7
F
G
(a) Write a formula for cell E2 to automatically display ‘‘needs improvement’’ or ‘‘well done’’.
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2017
06_0417_13_2017_1.1
[3]
7
(b) The school is going to use the data from the spreadsheet in its reports to parents. The school
plans to mail merge the report with the data.
Describe four advantages of using mail merge.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(c) The teacher needs to check the data source and template before the data is merged.
Describe three checks that need to be done.
1.........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
[3]
© UCLES 2017
06_0417_13_2017_1.1
[Turn over
8
8
A club is setting up a database to store details of its members.
(a) Complete the data dictionary of the database, adding the most appropriate data type for each
field.
Field name
Data type
Membership_number
Number
Member_name
Membership_fee_paid
Boolean
Telephone_number
Expiry_date_of_membership
Membership_fee_amount
[4]
(b) The club secretary wishes to find all the junior members who have paid their membership fee
which would be less than $100.
He searches for these members by typing in the following search criteria.
Membership_fee_amount < 100 AND Membership_fee_paid ="Y"
He now wishes to invite selected members to a special evening. These members will be those
with a membership number over 200 as well as members whose membership expiry date is
before 1 Jan 2017.
Write search criteria to list all the members that should be invited.
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2017
06_0417_13_2017_1.1
[5]
9
(c) Discuss the benefits and drawbacks of storing membership details on a computer database.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
9
[6]
Describe the differences between ROM and RAM.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2017
06_0417_13_2017_1.1
[4]
[Turn over
10
10 Using computers can cause problems for the health and safety of users.
(a) Evaluate your own use of computers in terms of health. Include any strategies you have
devised.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[6]
(b) Name three safety issues associated with your use of computers. For each issue describe a
way of minimising the risk.
1.........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2.........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
3.........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[6]
© UCLES 2017
06_0417_13_2017_1.1
11
11
Systems can be implemented in different ways; one of these is direct changeover.
Name three other methods of implementation. For each method give an advantage when compared
with direct changeover.
1 ................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
3 ................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
[6]
12 With the increased use of the internet, software copyright rules are being broken more often.
(a) Explain what is meant by software copyright.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(b) Software piracy is one major consequence of the failure to comply with copyright rules.
Describe the ways software can be protected from piracy.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2017
06_0417_13_2017_1.1
[4]
[Turn over
12
13 Key-loggers are thought to be security risks but they can be used to monitor and track the use of
employees on a computer system.
(a) Describe how a key-logger monitors computer usage.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(b) A small minority of employees in a company have been using the computers for non-business
use, so the company has had to introduce other methods of monitoring their use of ICT.
Apart from key-logging list three other ways that employees could be monitored in their use
of ICT.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
© UCLES 2017
06_0417_13_2017_1.1
13
14 Recently mobile phones have been used to pay for goods in stores and supermarkets. One method
of payment involves holding the phone close to a reader in the store.
Discuss the advantages and disadvantages of this method of payment compared with other methods
of credit/debit card transactions.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2017
06_0417_13_2017_1.1
[8]
14
BLANK PAGE
© UCLES 2017
06_0417_13_2017_1.1
15
BLANK PAGE
© UCLES 2017
06_0417_13_2017_1.1
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2017
06_0417_13_2017_1.1
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 8 1 5 0 8 0 0 2 7 7 *
0417/11
INFORMATION AND COMMUNICATION TECHNOLOGY
October/November 2017
Paper 1 Theory
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page and on any
additional pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 12 printed pages.
DC (CE/FD) 132681/3
© UCLES 2017
[Turn over
2
1
There are many types of printer. Name the printer which best fits the descriptions given below.
(a) A printer that prints by pressing metal pins against an ink ribbon onto the paper
...............................................................................................................................................[1]
(b) A printer that sprays tiny droplets of ink directly onto the paper
...............................................................................................................................................[1]
(c) A printer that uses toner to transfer the print image to plain paper
...............................................................................................................................................[1]
(d) A printer that uses resin to create solid objects
...............................................................................................................................................[1]
2
Complete each sentence below using the most appropriate item from the list.
a bridge
a hub
a keyboard
a microphone
a mouse
a printer
a router
a scanner
a sensor
a switch
(a) A network device which broadcasts data passing through it is called
...............................................................................................................................................[1]
(b) A network device that connects a LAN with the internet is called
...............................................................................................................................................[1]
(c) A network device that connects a LAN to another LAN using the same protocol is called
...............................................................................................................................................[1]
(d) A network device that learns which devices are connected to which ports is called
...............................................................................................................................................[1]
© UCLES 2017
0417/11/O/N/17
3
3
Tick whether the following statements are true or false.
true
(3)
false
(3)
Answers to multiple choice examination papers can be read using an
Optical Mark Reader.
MICR reads the information on a credit card.
The chip on a credit card is read by a PIN reader.
An RFID chip can be used to track stock.
[2]
4
Tick whether the following activities are part of the Design or the Implementation or the
Evaluation of a system.
Design
(3)
Implementation
(3)
Evaluation
(3)
Comparing the outcomes with the original task
requirements
Changing over to the new system
Identifying any limitations and necessary
improvements to the system
Selecting validation routines
[4]
5
Laptop computers are often equipped with Solid State Drives (SSD) or Hard Disk Drives (HDD).
(a) Give four advantages of SSD compared to HDD.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2017
0417/11/O/N/17
[Turn over
4
(b) People now tend to buy laptops rather than desktop computers. Despite this, desktop
computers are still fairly popular.
Describe three advantages of using a desktop computer rather than a laptop computer.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
6
Describe the differences between the internet and an intranet.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
© UCLES 2017
0417/11/O/N/17
5
7
A city hospital has decided to use emerging technology to automate its packaging and dispensing
of medicines to patients. It has decided to use a robotic system which identifies the medicine
using bar codes.
(a) Discuss the advantages and disadvantages to the hospital of using robots within this
environment rather than using humans to carry out the task.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[7]
© UCLES 2017
0417/11/O/N/17
[Turn over
6
(b) The system currently uses bar codes to read the data on the medicine packets as well as the
shelf that the medicine packets are located on. The hospital is considering using embedded
RFID chips in the packaging rather than bar codes.
Explain the advantages of using RFID chips in this scenario.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
8
Computers can be subject to hacking.
Explain what is meant by hacking and the effect it can have on the data or the computer.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[2]
© UCLES 2017
0417/11/O/N/17
7
9
A technician has told Moira that her computer might have a virus.
Describe three reasons why the technician might think this.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
[3]
10 A new employee of a company is required to log on to the company’s computer system and will
need to create a suitable password.
(a) Give three rules that the company would have in place, to help the employee choose a
password.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(b) He changes his password to R4hB5&Fg1
Explain why he has chosen this password.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(c) When a password is changed it is verified.
Identify the type of verification which is carried out.
...................................................................................................................................................
...............................................................................................................................................[1]
0417/11/O/N/17
[Turn over
© UCLES 2017
8
11
You have created a spreadsheet to help your teacher to show progress in a series of tests.
A
1
2
Student
A
B
C
D
Test mark Progress
10
3
4
(a) Write a formula to be placed in cell C2 to produce the following:
“Making progress” if the mark is 75 or more
“Satisfactory” if the mark is 50 to 74 marks
“Needs improvement” if the mark is 0 to 49 marks
...................................................................................................................................................
...............................................................................................................................................[5]
(b) (i)
Having created the formula, it needs to be tested to show that it displays the correct
comment for each mark. Suggest an item of test data that would satisfy each of the
following tests.
Each item of test data must be different.
Test data
Expected output
Type of test
Making progress
Test using normal data
Satisfactory
Test using normal data
Needs improvement
Test using extreme data
Satisfactory
Test using extreme data
[4]
(ii)
Explain why testing is important.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
© UCLES 2017
0417/11/O/N/17
9
(c) You are now asked to enter the marks for an additional 19 students into the spreadsheet and
to produce a bar chart showing the student names and their test marks.
Describe how you would create the bar chart.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
12 Brian is creating a website for a sports club.
(a) Tick whether the following statements refer to the behaviour layer or the content layer or the
presentation layer of this website.
behaviour
(3)
content
(3)
presentation
(3)
To format whole web pages
Consists of navigation pointers
Defined by the CSS
To enter scripting language to a web page
[4]
(b) Define the following internet terms.
HTTPS ......................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
URL ...........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2017
0417/11/O/N/17
[Turn over
10
13 For each of the statements below, identify the health problem most likely to be associated with
them and a possible solution to the problem. Your answers should be different in each case.
Health problem
Possible solution
Prolonged use of the
keyboard
Looking at a monitor for
a long period of time
Sitting too long in one
position
[6]
14 A library has a relational database consisting of two tables – one containing information about its
books and the other containing information about borrowers. Below are two lists showing the field
names for each table. A borrower can borrow several books at a time.
Book table
Borrowers table
Book_ID
Borrower_ID
Book_title
Borrower_name
Book_author
Telephone_contact
Year_published
Borrower_address
Cost_of_book
Borrower_email
Borrower_ID
Date_due_back
(a) Identify the primary key in the Book table.
...............................................................................................................................................[1]
(b) Identify the foreign key in the Book table.
...............................................................................................................................................[1]
(c) Identify the type of relationship that exists between the tables.
...............................................................................................................................................[1]
© UCLES 2017
0417/11/O/N/17
11
(d) Describe two advantages of using a relational database rather than a flat file database.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(e) When the systems analyst was creating the new system she had to produce appropriate data
types for each field.
Write down the most appropriate data type for each field.
Field name
Data type
Cost_of_book
Borrower_name
Telephone_contact
Date_due_back
[4]
15 Many people think there should be greater control of the use of the internet.
Describe the advantages and disadvantages of policing the internet.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[5]
© UCLES 2017
0417/11/O/N/17
[Turn over
12
16 Discuss the benefits and drawbacks of using the cloud for storing data rather than other methods.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2017
0417/11/O/N/17
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 1 3 2 2 0 9 4 6 7 5 *
0417/12
INFORMATION AND COMMUNICATION TECHNOLOGY
October/November 2017
Paper 1 Theory
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 15 printed pages and 1 blank page.
DC (CE/FC) 132682/3
© UCLES 2017
[Turn over
2
1
Tick whether the following statements would apply to a LAN, a WAN or a WLAN.
LAN
(3)
WAN
(3)
WLAN
(3)
The internet is an example of this type of network
A wired network found within a single building
This network uses wireless technology
This network is spread over a large geographical area
2
[4]
Complete the following sentences, using the most appropriate technology from the list below.
a 3D printer
artificial intelligence
batch processing
biometrics
a dot matrix printer
a microphone
a password
a robot
a scanner
a speaker
(a) A printer that is capable of producing physical objects is called
...............................................................................................................................................[1]
(b) The use of a computer to perform tasks that mimic or duplicate the functions of the human
brain is called
...............................................................................................................................................[1]
(c) A device used in a car production line to assemble a car is called
...............................................................................................................................................[1]
(d) Authentication techniques that use fingerprints or retina scans is called
...............................................................................................................................................[1]
© UCLES 2017
0417/12/O/N/17
3
3
A school is holding an athletics competition. The timings of each running event will be measured
electronically using sensors at the start and finish. Runners begin a race in starting blocks. When
the starting pistol is fired the electronic timing starts. The winner of the race is the first to break the
light beam at the end of the race.
(a) Complete the table using the most appropriate words from the list below.
Infra-red sensor
Light sensor
Moisture sensor
Motion sensor
pH sensor
Pressure sensor
Sound sensor
Temperature sensor
Device
Data from the starting pistol is read by this
device
This device detects that the athlete has left
the starting block
When the light beam is broken the data is
read by this device
[3]
(b) A member of the sports department will use a computer to produce a magazine of the
competition. He will include photographs stored in a digital camera as well as printed
photographs.
Identify the methods he would use to transfer the photographs to the computer.
Digital camera photograph �������������������������������������������������������������������������������������������������������
...................................................................................................................................................
Printed photograph �������������������������������������������������������������������������������������������������������������������
...................................................................................................................................................
[2]
© UCLES 2017
0417/12/O/N/17
[Turn over
4
4
You have been asked to set up a hierarchical folder structure for your IGCSE ICT work directories
so that you can easily locate certain files.
(a) Fill in the boxes and complete the most appropriate hierarchical folder structure, to store
practical and theory work for both homework and classwork.
ICT
A
[2]
(b) Complete the file path for a document called input_devices.rtf stored in box A.
...............................................................................................................................................[1]
5
(a) Describe the processes a web browser has to go through to load a web page.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2017
0417/12/O/N/17
5
An organisation is creating a company website and is deciding whether to make it available on the
internet or create a company intranet. The website will contain confidential information.
(b) Explain why they should use an intranet rather than the internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
© UCLES 2017
0417/12/O/N/17
[Turn over
6
6
Using the images below write down the Safety issue referred to and a way of Minimising the
risk.
Image
Safety issue
Minimise the risk
[8]
© UCLES 2017
0417/12/O/N/17
7
7
One popular reason for young people using the internet is playing online games. One way of
ensuring that young people are safe is to use fictional names to identify themselves.
Describe other measures that should be taken to ensure that playing online games is safe for
young people.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
© UCLES 2017
0417/12/O/N/17
[Turn over
8
8
Hot House Design keeps to a corporate house style when creating a website.
Web page 1
Web page 2
Using examples from the two webpages, explain what is meant by house style.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
© UCLES 2017
0417/12/O/N/17
9
9
The internet is used as a method of communication. This includes Blogs, Wikis and VOIP.
(a) Describe the following ways of communicating.
(i)
Blog
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii)
Wiki
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(iii)
VOIP
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(b) The internet has a number of security issues.
Tick whether the following statements would apply to Phishing, Pharming or Smishing.
Phishing
(3)
Pharming
(3)
Smishing
(3)
The sending of fraudulent emails appearing to
come from legitimate companies in order to steal
passwords
Redirecting users to a bogus website that looks
authentic
Security attack where a user is tricked into
downloading a virus on to a cell phone
As the user types details they are stored by the
criminal
© UCLES 2017
0417/12/O/N/17
[4]
[Turn over
10
10 The Ocean Sailing Company offers the experience of sailing on a yacht. Customers can choose
which type of yacht they want to sail on. The owner keeps a spreadsheet to calculate the cost
to customers. The owner allocates a loyalty code to each customer. Each code has a different
discount.
A
1
B
C
D
E
Holiday Cruises
2
3
Code
Discount
4
1
0.05
5
2
0.1
6
7
3
0.125
1
Name of Yacht
Ocean Speed
8
9
Cost per day
Number
of days Percentage Discount
=VLOOKUP(A9,$A$4:$B$6,2)
7
10 2
11 3
Sealord
Sunliner
5
5
12 1
13 2
Pacifico
10
Alexander
Moonliner
14
Coronia
Voyager
7
14 3
15 2
16 2
500
Discount
5
5
(a) Explain each element of the formula in cell D9.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) Identify the value you would expect to see in cell D9.
...............................................................................................................................................[1]
(c) The Discount is the cost per day multiplied by the number of days multiplied by the
Percentage Discount.
Write a formula that would be entered in cell E9 to calculate the Discount.
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2017
0417/12/O/N/17
11
(d) The $ symbol is used in the formula in cell D9.
Name this type of referencing and explain why it is used.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(e) The Ocean Sailing Company owns a number of yachts.
Explain how you could replicate the formulae to calculate the Percentage Discount and the
Discount for each yacht.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2017
0417/12/O/N/17
[Turn over
12
11
A theatre manager wishes to introduce an online booking system. A programmer has been asked
to write the software. She could continue on her own or discuss the ideas with the theatre manager.
(a) Explain why is it beneficial to discuss ideas with the theatre manager before writing the
software.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Give four advantages of using online booking systems for the customer rather than using
manual systems.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2017
0417/12/O/N/17
13
12 Contactless debit cards are replacing standard debit cards. Some countries are introducing
contactless debit card transactions at ATM machines.
Give three disadvantages to the customer of using these cards at an ATM.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
[3]
13 A travel agent specialising in adventurous holidays has asked a systems analyst to recommend a
new computer system for their records. The systems analyst’s first task is to research the current
system.
(a) Identify three methods of researching the current system.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(b) The company has decided to set up a website to publicise its holidays.
Name three appropriate types of object that could be inserted into the web page.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2017
0417/12/O/N/17
[Turn over
14
14 A robot is used as a computerised postal delivery system. It drives around the corridors of a set of
offices picking up and delivering post. If the robot is close to a worker it stops and waits until the
worker moves away.
(a) A proximity sensor is used to detect how close to a worker the robot is.
Describe the role of the microprocessor in stopping the robot.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(b) Robots are being used more and more in offices to carry out menial tasks, like delivering
post.
Describe the advantages and disadvantages of using robots in this way.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
© UCLES 2017
0417/12/O/N/17
15
15 A word processing program uses a Graphical User Interface (GUI). Using examples from the word
processing program describe three features of a GUI.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
[3]
16 The banking industry has rapidly changed over the last few years as modern technology has
developed.
Discuss the advantages and disadvantages of using online banking rather than other banking
methods to the customer.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
© UCLES 2017
0417/12/O/N/17
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2017
0417/12/O/N/17
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 7 2 1 6 6 7 7 4 2 9 *
0417/13
INFORMATION AND COMMUNICATION TECHNOLOGY
October/November 2017
Paper 1 Theory
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 15 printed pages and 1 blank page.
DC (CE/FD) 132683/3
© UCLES 2017
[Turn over
2
1
Complete the sentences, using the most appropriate item from the list.
a Blu-ray disc
a compact disc
a hard disk
a magnetic tape
a memory card
a pen drive
a processor
RAM
ROM
a solid state drive
(a) Optical storage medium that is often used to store HD movies is called
...............................................................................................................................................[1]
(b) Internal memory where the data cannot be changed is called
...............................................................................................................................................[1]
(c) Magnetic medium which can only be used for serial access is called
...............................................................................................................................................[1]
(d) Internal memory that is volatile is called
...............................................................................................................................................[1]
2
Tick whether the following are examples of application or system software.
application
(3)
system
(3)
Linker
Database management systems
Photo-editing software
Compiler
3
[2]
Tick whether the following statements are true or false.
true
(3)
false
(3)
CRT monitors use more power than TFT monitors
A touch screen can be used as an input device or an output device
A dot matrix printer produces high quality graphics
A motor is an input device
© UCLES 2017
[2]
0417/13/O/N/17
3
4
Tick three ways in which data entry can be verified.
Tick
(3)
Compare with source document
Carry out a range check on the data
Only accept alphabetic characters
Get a second person to read through the document
Ensure the data is 100% accurate
Type in the data twice and compare versions
Calculate a check digit
Check spelling
5
[3]
Identify three ways in which employment patterns have changed since the introduction of ICT.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
[3]
© UCLES 2017
0417/13/O/N/17
[Turn over
4
6
Peter was asked to resize an image to fit a space in a document. The image before the change
and the image after the change are shown below.
The image before the change
The image after the change
(a) Describe the steps Peter used to resize the image.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Peter has been asked to remove some of the sky in the image.
Identify the formatting technique Peter would use to do this.
...................................................................................................................................................
...............................................................................................................................................[1]
(c) Having created the document, Peter needs to email it to his teacher. The file is too large for
the email attachment. The file size must be reduced so it can be attached to the email.
Describe the steps required to carry out this process.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2017
0417/13/O/N/17
5
7
An electricity company has created a new computer system to produce its bills.
After the system was implemented a number of customers complained about very expensive bills.
Each module was tested in the system using validation checks.
(a) Explain what other testing should have been carried out before the system was implemented.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Prior to implementation the management was undecided over the method of changeover to
be used.
Explain why the management would choose direct changeover rather than parallel running.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2017
0417/13/O/N/17
[Turn over
6
8
Data transmitted through the World Wide Web can be protected by encryption.
(a) Explain what is meant by encryption of data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) Explain what is meant by a digital certificate.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
9
Shopping often requires the use of a credit card.
(a) Give three methods of reading the data from the credit card.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2017
0417/13/O/N/17
7
(b) Shopping for groceries using the internet has become popular and is replacing more traditional
types of grocery shopping.
Describe the advantages and disadvantages of grocery shopping using the internet rather
than other methods.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
10 (a) A website uses anchors.
Describe what an anchor is and how it is used.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) Write the HTML markup to create an anchor called “Top”.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(c) State the main purpose of a web browser.
...................................................................................................................................................
...............................................................................................................................................[1]
© UCLES 2017
0417/13/O/N/17
[Turn over
8
11
A school library has computerised its book borrowing system. Students are allowed to borrow
books free of charge.
(a) When a book is borrowed the details of the book and the borrower have to be input to the
system.
Tick three direct data entry devices which could be used in such a system.
Direct data entry device
Tick
Bar code reader
Magnetic Ink Character Reader
Magnetic stripe readers
Keyboard
Mouse
RFID chip reader
[3]
(b) The library uses a database with two tables: borrowers and books. They have recently
purchased a biometric reader which will identify the borrower from their thumb print. A
borrower may only borrow a maximum of six books.
Describe the computer processing involved when a book is borrowed using this system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
© UCLES 2017
0417/13/O/N/17
9
Question 12 starts on page 10.
© UCLES 2017
0417/13/O/N/17
[Turn over
10
12 A systems analyst is creating a new database for a shop to store the details of its mobile (cell)
phones. Part of the design of this database will involve the identification of suitable validation
checks.
Below is a list of some of the data to be included in the database.
ID_number
Make
Model
Connectivity
Price
Z13026
YNOS
NAM1
5G
$299.00
A23543
OIKAN
RID4
3G
$150.99
T32167
MUGAS
BLK2
4G
$250.00
(a) For the following fields write down the most appropriate validation check. Each validation
check must be different. The database will have at least 100 records and each ID number will
be different.
ID_number
...................................................................................................................................................
...............................................................................................................................................[1]
Connectivity
...................................................................................................................................................
...............................................................................................................................................[1]
Price
...................................................................................................................................................
...............................................................................................................................................[1]
© UCLES 2017
0417/13/O/N/17
11
(b) Design a screen input form which would be used to input data for one mobile (cell) phone,
using all the fields shown in the example data.
In your answer include appropriate spacing for each field, and navigational aids.
[5]
(c) The system is being tested using live data. Write the search criteria you would enter into
the database to search for a mobile (cell) phone costing less than $200.00 which has a
connectivity of 4G.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
© UCLES 2017
0417/13/O/N/17
[Turn over
12
13 A theatre uses an online booking system to allow customers to book specific seats for its
performances.
A customer has loaded the theatre website. Describe the inputs and outputs of such a system
before the customer pays for a ticket.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[5]
© UCLES 2017
0417/13/O/N/17
13
14 Contactless debit cards are replacing standard debit cards. Some countries are introducing
contactless debit card transactions at ATM machines.
Discuss the advantages and disadvantages to the bank of using these cards at an ATM.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
15 Computers can be used in different applications to control a process, to simply gather data
(measurement only) or to mimic a human expert (expert systems).
(a) Tick whether the following applications use Control, Measurement (only) or Expert system.
Control
(3)
Measurement
(only)
(3)
Expert system
(3)
Computerised glasshouse
Burglar alarm
Chess games
Automatic washing machine
Recording weather conditions
Monitoring air pollution
© UCLES 2017
[6]
0417/13/O/N/17
[Turn over
14
(b) Measurement systems can use sensors. The computer cannot read the data directly from the
sensor.
Explain how a device can be used to enable the computer to read the data from the sensor.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) Identify the four components of an expert system.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
16 State what is meant by OMR and MICR, giving an example of their use.
OMR .................................................................................................................................................
..........................................................................................................................................................
Example ...........................................................................................................................................
..........................................................................................................................................................
MICR ................................................................................................................................................
..........................................................................................................................................................
Example ...........................................................................................................................................
..........................................................................................................................................................
[4]
© UCLES 2017
0417/13/O/N/17
15
17 Social networking is often used today rather than face-to-face conversations, letter writing and
telephone conversations.
Discuss the advantages and disadvantages of using social networking.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
© UCLES 2017
0417/13/O/N/17
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2017
0417/13/O/N/17
INFORMATION AND COMMUNICATION
TECHNOLOGY
Paper 1 Theory
2016
www.gceguide.com
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 8 8 7 0 3 9 4 6 6 4 *
0417/12
INFORMATION AND COMMUNICATION TECHNOLOGY
Paper 1 Theory
February/March 2016
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your name, Centre number and candidate number in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 15 printed pages and 1 blank page.
DC (KN/CGW) 114006/4
© UCLES 2016
[Turn over
2
1
There are a number of different types of computer.
Write down the type of computer that best fits the following descriptions.
(a) A computer that is difficult to move and has a separate monitor and keyboard.
...............................................................................................................................................[1]
(b) A portable computer that includes a physical keyboard.
...............................................................................................................................................[1]
(c) A thin portable computer that has a touch screen and a battery in a single unit, not normally
used to make phone calls.
...............................................................................................................................................[1]
(d) A mobile phone that can be used as a computer.
...............................................................................................................................................[1]
2
Tick whether the following are features of operating systems containing a command line interface
(CLI) or a graphical user interface (GUI).
CLI
(✓)
GUI
(✓)
Instructions have to be typed.
Applications are represented by icons.
Options are chosen from a menu.
Many instructions have to be memorised.
[2]
3
Tick whether the following statements about output devices are true or false.
true
(✓)
false
(✓)
A multimedia projector is used to output slide shows.
A laser printer is a type of page printer.
An inkjet printer cartridge lasts longer than a laser printer toner cartridge
producing the same output.
A dot matrix printer produces very high quality printouts quickly.
[2]
© UCLES 2016
0417/12/F/M/16
3
4
The use of computers has led to some employees changing their working patterns.
Complete the following sentences.
(a) Two or more employees doing the same job but working at different times is called
...............................................................................................................................................[1]
(b) When a person is employed to work fewer hours than the normal working week, this is called
...............................................................................................................................................[1]
(c) When employees work the full normal hours in a week but work at times which suit them and
the employer, this is called
...............................................................................................................................................[1]
(d) When an employee works the full normal hours in a week but works fewer days, this is called
...............................................................................................................................................[1]
5
Describe four strategies that you could use to minimise the dangers of using social networking
sites to make new friends.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
4 .......................................................................................................................................................
..........................................................................................................................................................
[4]
© UCLES 2016
0417/12/F/M/16
[Turn over
4
6
Use examples to describe the difference between a weak password and a strong password.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
7
The following diagram shows towns A and B and the two roads that connect them.
A
C
B
Describe how a satellite navigation system (sat nav) in a motor vehicle would calculate the quickest
route from A to B.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
© UCLES 2016
0417/12/F/M/16
5
8
Describe how data is sent from a networked computer to a computer on a different network.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
9
(a) Describe two similarities between physical faxing and electronic faxing.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Describe three differences between physical faxing and electronic faxing.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2016
0417/12/F/M/16
[Turn over
6
10 In certain countries, the RFID chip in a passport is scanned when the passport is presented at an
automated passport control gate.
(a) Give three items of information about the passport holder that are stored on the RFID chip.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(b) Describe how RFID technology reads the details from the chip.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(c) Explain why RFID technology is used for reading data from passports.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2016
0417/12/F/M/16
7
11 The following is part of a database of cars (automobiles).
Make Registration_number
Engine_size
Maximum_speed
Colour
Parking_sensors
Frod
K674 TUV
1.3
140
red
Y
Olep
K349 XUP
1.4
140
white
N
Yotoya
R123 AZN
2.0
160
blue
Y
Yotoya
U283 BBV
1.7
175
red
Y
Frod
K943 SCG
1.3
180
blue
Y
(a) You have been asked to design a suitable input screen which will enable this data to be
entered.
Complete the following screen for one car only, before the data is entered.
[6]
© UCLES 2016
0417/12/F/M/16
[Turn over
8
(b) For each of the following fields, name and describe the most appropriate validation check.
Assume that the values given in the numeric fields include the minimum and maximum values
for those fields.
(i)
Registration_number .........................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(ii)
Maximum_speed ...............................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
Operators such as AND, OR, NOT, LIKE, >, <, =, >=, <=, <> can be used to search the database
for information. A search for all the red Frod cars would look like this:
Make = “Frod”
AND
Colour = “red”
Use appropriate operators from the examples given to answer the following.
(c) Write down a search which will produce a list of the cars where the size of engine is greater
than 1.4, in addition to all those cars which have parking sensors.
...............................................................................................................................................[5]
(d) Write down the registration numbers of those cars that match the requirements of part (c).
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2016
0417/12/F/M/16
9
12 This is part of a spreadsheet used to calculate workers’ earnings after tax.
A
1 Rate of income tax
2
3
4 Amir Khan
5 John Jones
6 Pierre Gaston
7 Jasvinder Sidhu
8 Zhou Wenlin
9
10
B
C
D
E
F
Pay
before
tax
Tax paid
Pay after
tax
£400.00
£288.00
£315.00
£340.00
£324.00
£100.00
£72.00
£78.75
£85.00
£81.00
£300.00
£216.00
£236.25
£255.00
£243.00
G
25%
Number
Hourly Rate
of hours
of pay
worked
£10.00
£8.00
£7.50
£8.50
£9.00
40
36
42
40
36
(a) Pay before tax is calculated by multiplying Hourly Rate of pay by Number of hours worked.
Write down the formula which should be entered in cell D4.
...............................................................................................................................................[1]
(b) The Tax paid by each worker is calculated by multiplying the Rate of income tax by their Pay
before tax.
Without using numerical values and by using absolute referencing where appropriate, write
down the formula which should be entered in cell E4.
...............................................................................................................................................[3]
(c) Explain what absolute referencing is and why it is needed in this example.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(d) Write down, using a function, the most efficient formula which should be entered in cell F9 to
calculate the total pay of these 5 workers.
...............................................................................................................................................[1]
© UCLES 2016
0417/12/F/M/16
[Turn over
10
13 HTTP is an internet protocol.
(a) Explain what is meant by HTTP.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Explain the differences between HTTP and HTTPS.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
14 Give four reasons why an internet search to find relevant information is not always fast.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
4 .......................................................................................................................................................
..........................................................................................................................................................
[4]
© UCLES 2016
0417/12/F/M/16
11
15 Describe the following file formats and explain the differences between them.
.txt ....................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.rtf .....................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[5]
© UCLES 2016
0417/12/F/M/16
[Turn over
12
16 The following is a word-processed worksheet to help 11-year-old students to understand part of
ancient India.
Patna, Bihar
The present-day capital of the Indian state of Bihar, Patna, was once believed to be the greatest
city on Earth.
In 300 BC, a Greek ambassador, Megasthenes, wrote that Pataliputra (as Patna was then called)
was ‘22 miles in circuit, with a wooden wall pierced by 64 gates and 570 towers, rivalling the
splendours of Persian cities such as Susa and Hamadan’.
Megasthenes spent time at the court of Chandragupta Maurya, India’s first great emperor. Maurya
presided over an empire stretching from Bengal to present-day Afghanistan from this majestic
capital. Pataliputra was built on the southern banks of the Ganges at the confluence of the rivers
Ganges, Son and Gandak. It had a significant Jain and Buddhist influence as both the Buddha and
Mahavira founder of Jainism lived and preached nearby.
King Asoka also had his capital at Pataliputra. The Agam Kuan or ‘Bottomless Well’ in which
Asoka is said to have put his prisoners to death (before he became influenced by Buddhism) still
exists in Patna today.
Describe five improvements to the worksheet that would make it more appealing to 11-year-old
students.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
4 .......................................................................................................................................................
..........................................................................................................................................................
5 .......................................................................................................................................................
..........................................................................................................................................................
[5]
© UCLES 2016
0417/12/F/M/16
13
17 Shape A has been transformed into shape B in three stages.
Y - axis
Shape A
Stage 1
X - axis
Shape B
Stage 3
Stage 2
Describe, in detail, what has happened at each stage.
Stage 1 .............................................................................................................................................
..........................................................................................................................................................
Stage 2 .............................................................................................................................................
..........................................................................................................................................................
Stage 3 .............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
© UCLES 2016
0417/12/F/M/16
[Turn over
14
18 Explain why you might want to insert a section break in a document.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
© UCLES 2016
0417/12/F/M/16
15
19 “Chip and PIN is the new, more secure way to pay with credit or debit cards ”.
Discuss the accuracy of this statement with regard to developments, since and including the use
of magnetic stripe cards at EFTPOS terminals and ATMs.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
© UCLES 2016
0417/12/F/M/16
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2016
0417/12/F/M/16
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
*2934623374*
INFORMATION AND COMMUNICATION TECHNOLOGY
Paper 1 Theory
0417/11
May/June 2016
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 15 printed pages and 1 blank page.
06_0417_11_2016_1.17
© UCLES 2016
[Turn over
2
1
Data can be input to a computer using direct data entry methods.
Write down the most appropriate device to input the following:
(a) information from the chip in an electronic passport
...........................................................................................................................................
[1]
(b) text from an id card
...........................................................................................................................................
[1]
(c) account details from the front of a credit card at an EFTPOS terminal
...........................................................................................................................................
[1]
(d) account details from the back of a credit card at an EFTPOS terminal
...........................................................................................................................................
2
[1]
Tick whether the following are examples of applications software or systems software.
applications (✓)
systems (✓)
Word processing
Compilers
Interpreters
Spreadsheet
[2]
3
Tick whether the following statements about desktop and laptop computers are true or false.
true (✓)
false (✓)
Most modern laptop computers have web cams built in.
Desktop computers are not very portable.
All desktop computers have a touchpad built in.
Laptop computers are rarely supplied with a mouse.
[2]
© UCLES 2016
06_0417_11_2016_1.17
3
4
Complete the following sentences.
(a) The action of sending emails to fraudulently obtain another person’s bank details is called
...........................................................................................................................................
[1]
(b) The action of illegally installing malicious code which redirects a person to a fraudulent website
with the purpose of obtaining that person’s bank details is called
...........................................................................................................................................
[1]
(c) Unsolicited bulk emails are called
...........................................................................................................................................
[1]
(d) The action of sending text messages to fraudulently obtain another person’s bank details is
called
...........................................................................................................................................
5
[1]
Most data protection acts include the principle that data should be stored securely.
List four other principles of a typical data protection act.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
3 ...............................................................................................................................................
..................................................................................................................................................
4 ...............................................................................................................................................
..................................................................................................................................................
[4]
© UCLES 2016
06_0417_11_2016_1.17
[Turn over
4
6
Ffiona wants to communicate with her friend Myfanwy using her mobile phone.
Describe four ways she could do this.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
3 ...............................................................................................................................................
..................................................................................................................................................
4 ...............................................................................................................................................
..................................................................................................................................................
[4]
7
The introduction of computers into the workplace has caused some changes in employment.
(a) Identify two different types of job where employment has decreased.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(b) Identify two different types of job where employment has increased.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
© UCLES 2016
06_0417_11_2016_1.17
5
8
Describe the details of computer addresses that are stored by a router.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
9
[4]
Internet banking can be used by bank customers to check their account balance.
(a) Many ways of logging into such a system involve the use of passwords.
Describe three methods of minimising the possibility of passwords being misused if intercepted.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(b) Describe three benefits to customers of using internet banking.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
© UCLES 2016
06_0417_11_2016_1.17
[Turn over
6
10 A ferry connects two countries. When car drivers approach the ferry they have to check in to confirm
the details they have already booked. If they drive in to the self check-in lane, details of the car are
automatically input to a computer. The terminal which is used for the driver to identify themselves
produces a personalised welcome message on a screen. There is a database which contains details
of the driver and the car.
(a) Write down the data which is automatically input to the computer.
...........................................................................................................................................
...........................................................................................................................................
[1]
(b) Other than your answer to (a) give two items of data stored in the computer database.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(c) Explain how Optical Character Recognition is used before the computer processes the data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(d) Explain the computer processing which takes place to produce the personalised message.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2016
06_0417_11_2016_1.17
[3]
7
11
Justdiscs Limited stocks many music CDs. Below is a small selection of CDs stored on their
database.
The data has been sorted on two fields.
Artist_name
CD_title
Price
Year_released
Number_of_tracks
Giggs
Let Em Ave It
$10.99
2010
18
Sabiton
Heroes
$9.99
2014
12
Luke Slater
Alright on Top
$8.99
2001
10
Arctic Monkeys
Humbug
$8.99
2009
12
Oasis
Definitely Maybe
$8.99
2014
11
Erasure
Erasure
$7.99
2009
11
Jimmy Smith
Cool Blues
$4.99
2002
7
(a) Write down the field which was used as the primary sort in the database and the order in which
it was sorted.
...........................................................................................................................................
...........................................................................................................................................
[2]
(b) Write down the field which was used as the secondary sort in the database and the order in
which it was sorted.
...........................................................................................................................................
...........................................................................................................................................
[2]
(c) Peter is the owner of the shop. He receives requests from customers about the CDs he has
in stock. He converts these requests into search criteria using comparison and Boolean
operators.
For example, one customer might ask for CDs which were released after 2002 and also those
that have at least 11 tracks. Peter would write this down as:
Year_released > 2002 OR Number_of_tracks >= 11
Write down the search criteria for a customer who wants a list of all the CDs which were
released before 2010 but only if they cost less than $8.99
...........................................................................................................................................
[5]
(d) Write down the names of the artists whose records match the requirements of part (c).
...........................................................................................................................................
© UCLES 2016
06_0417_11_2016_1.17
[2]
[Turn over
8
12 An airline company allows customers to book flights online.
Here is an example of the data a customer is asked to type in when they search for a suitable flight,
together with a typical entry. There are three types of class: Economy, Business and First.
Departure airport
LHR
Arrival airport
DXB
Date of departure
21/9/2016
Date of return
8/10/2016
Class
Economy
Number of adults
2
Number of children
2
Number of infants
1
Below is an input screen designed to help this data to be entered.
Departure airport
Arrival airport
Date of departure
Date of return
Class
Number of adults
Number of children
Number of infants
© UCLES 2016
06_0417_11_2016_1.17
9
(a) Evaluate this form regarding the ease of entering data
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[6]
(b) Explain why it would not be appropriate for a format check to be used on the dates as given
in the example data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
13 (a) Explain what is meant by a URL.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2016
06_0417_11_2016_1.17
[2]
[Turn over
10
(b) Below is an extract from some HTML markup.
<h1>Support these animals!</h1>
<h2>Click on an image for further details</h2>
</td>
<td><h2>Giraffe</h2>
</td>
<td><a href="http://www.cie.org.uk/gcseict/giraffe.htm" target="_giraffe">
<img src="J1432img2.jpg" alt="giraffe" height="120px"></a>
</td>
</tr>
<tr>
<td><h2>Tiger</h2>
</td>
<td><img src="J1432img7.jpg" alt="tiger" height="120px"></td>
</tr>
Identify the URL in this extract and explain why it is included in this line in the markup.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
14 Juanita has a computer and a contract with an ISP. When she searches the internet she does not
find relevant information quickly.
Describe three ways she could reduce the amount of excess information she gets without changing
either her computer or ISP.
1 ................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
3 ................................................................................................................................................
..................................................................................................................................................
[3]
© UCLES 2016
06_0417_11_2016_1.17
11
15 Explain, using at least three different examples, what is meant by the term ‘generic file formats’.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
[4]
16 Nicholas is the manager of a sports club. The club has football, cricket, netball and hockey teams.
When he needs to send a letter to members of a team he types out the letter, prints it and makes
several photocopies of it to send to members.
He has a database of members and has decided that in future he will use mail merge to print the
letters.
Give the advantages of using mail merge instead of photocopying the letters.
1 ................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
3 ................................................................................................................................................
..................................................................................................................................................
4 ................................................................................................................................................
..................................................................................................................................................
[4]
© UCLES 2016
06_0417_11_2016_1.17
[Turn over
12
17 Below is a spreadsheet showing the countries which have hosted the Commonwealth Games.
A
1
2
3 1930
4 1934
5 1938
6 1950
7 1954
8 1958
9 1962
10 1966
11 1970
12 1974
13 1978
14 1982
15 1986
16 1990
17 1994
18 1998
19 2002
20 2006
21 2010
22 2014
23
24
25
26
27
B
C
D
E
F
G
H
I
Venues for the Commonwealth Games
Canada
England
Australia
New Zealand
Canada
Wales
Australia
Jamaica
Scotland
New Zealand
Canada
Australia
Scotland
New Zealand
Canada
Malaysia
England
Australia
India
Scotland
Canada
England
Australia
New Zealand
Wales
Jamaica
Scotland
Malaysia
India
4
2
4
3
1
1
3
1
1
4
3
2
1
0
Canada England Australia
New
Wales
Zealand
Jamaica Scotland Malaysia
India
(a) Write down suitable titles for:
(i) The category axis..........................................................................................................
...........................................................................................................................................
(ii) The value axis..............................................................................................................
...........................................................................................................................................
(iii) The chart.....................................................................................................................
...........................................................................................................................................
[3]
(b) What is this type of chart called?
...........................................................................................................................................
© UCLES 2016
06_0417_11_2016_1.17
[1]
13
18 Identify and describe the three web development layers.
1 ................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
3 ................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
[6]
© UCLES 2016
06_0417_11_2016_1.17
[Turn over
14
19 Discuss the effectiveness of different methods which could be used to prevent unauthorised access
to a laptop computer.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2016
06_0417_11_2016_1.17
[8]
15
20 Here is some text taken from the CIE website.
Cambridge Primary Checkpoint is designed to help students learn by providing comprehensive
feedback on their strengths and weaknesses in the key curriculum areas - English, mathematics and
science.
The tests are exclusively available to schools that offer Cambridge Primary and are generally taken at
the end of the final year of the programme. They are marked by Cambridge and provide schools with
an international benchmark for learner performance. Each learner receives a statement of
achievement and a diagnostic feedback report, giving schools invaluable information and parents
extra trust in the feedback they receive.
We hold two Cambridge Primary Checkpoint test series each year, covering all major areas of
learning in the Cambridge Primary curriculum frameworks for English, mathematics and science.
Schools teaching Cambridge Primary English as a Second Language curriculum can enter learners for
tests provided by our sister organisation, Cambridge English Language Assessment.
Here is the same text after it has been reformatted.
Cambridge Primary Checkpoint is designed to help students learn by providing
comprehensive feedback on their strengths and weaknesses in the key curriculum areas - English,
mathematics and science.
The tests are exclusively available to schools that offer Cambridge Primary and are generally
taken at the end of the final year of the programme. They are marked by Cambridge and provide
schools with an international benchmark for learner performance. Each learner receives a statement of
achievement and a diagnostic feedback report, giving schools invaluable information and parents
extra trust in the feedback they receive.
We hold two Cambridge Primary Checkpoint test series each year, covering all major areas of
learning in the Cambridge Primary curriculum frameworks for English, mathematics and science.
Schools teaching Cambridge Primary English as a Second Language curriculum can enter learners
for tests provided by our sister organisation, Cambridge English Language Assessment.
Describe the four formatting techniques which have been used.
1 ................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
3 ................................................................................................................................................
..................................................................................................................................................
4 ................................................................................................................................................
..................................................................................................................................................
[4]
© UCLES 2016
06_0417_11_2016_1.17
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2016
06_0417_11_2016_1.17
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
*9659398909*
INFORMATION AND COMMUNICATION TECHNOLOGY
Paper 1 Theory
0417/12
May/June 2016
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 14 printed pages and 2 blank pages.
06_0417_12_2016_1.19
© UCLES 2016
[Turn over
2
1
Write down the most appropriate input device which matches the following descriptions:
(a) This is provided with a laptop to imitate the functions of a mouse.
...........................................................................................................................................
[1]
(b) This is not a mouse but is used to manoeuvre objects around the screen in computer video
games.
...........................................................................................................................................
[1]
(c) This is used to type in text.
...........................................................................................................................................
[1]
(d) This is used for direct input of hard copy images.
...........................................................................................................................................
2
[1]
Tick whether the following statements are true or false.
true
false
(✓)
(✓)
A microphone is an output device.
The Control Unit is part of the Central Processing Unit.
The Arithmetic and Logic Unit is part of the Central Processing Unit.
A temperature sensor is an input device.
[2]
3
Tick whether the following statements would most appropriately apply to the internet or an intranet.
internet
intranet
(✓)
(✓)
A public computer network.
Is easier to protect sensitive data from hackers.
The content is more easily controlled.
Exists within a single organisation only.
[2]
© UCLES 2016
06_0417_12_2016_1.19
3
4
Complete the following sentences.
(a) A piece of programming code which maliciously deletes files is called
...........................................................................................................................................
[1]
(b) The scrambling of data to make it unreadable by unauthorised users is called
...........................................................................................................................................
[1]
(c) An internet protocol for delivering private messages using cryptography is called
...........................................................................................................................................
[1]
(d) An attachment to an electronic message used to verify the identity of the sender is called
...........................................................................................................................................
5
[1]
Describe four methods you could use to minimise the likelihood of receiving spam emails.
1 ................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
3 ................................................................................................................................................
..................................................................................................................................................
4 ................................................................................................................................................
..................................................................................................................................................
[4]
© UCLES 2016
06_0417_12_2016_1.19
[Turn over
4
6
A school’s Science department has a network which uses WiFi. A teacher has a laptop computer
and whilst in school wishes to connect to this network.
(a) Write down the name of this type of network.
...........................................................................................................................................
[1]
(b) In order to access the network the laptop must be within range of a type of WiFi network device.
(i)
Write down the name of this type of device.
................................................................................................................................
[1]
(ii) Describe how this device is connected to the network using an ethernet cable.
................................................................................................................................
................................................................................................................................
[1]
(c) WiFi networks can be limited in their range.
Describe one other disadvantage of a WiFi network compared to a cabled network.
...........................................................................................................................................
...........................................................................................................................................
7
[1]
(a) Explain what is meant by VOIP.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(b) Name two items of computer hardware that are needed in order to make a VOIP phone call
from one computer to another.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
© UCLES 2016
06_0417_12_2016_1.19
5
8
There are many microprocessor controlled devices used in the modern home.
Describe two drawbacks in terms of lifestyle changes this has produced for the users of such
devices.
1 ................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
[2]
9
A customer wishes to check the balance of their bank account and inserts their card into the ATM.
(a) Describe the computer processing which takes place at the ATM.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(b) Describe the computer processing which takes place at the bank’s computer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2016
06_0417_12_2016_1.19
[3]
[Turn over
6
10 When a bank cheque is presented to a bank it is sent off to a cheque clearing centre.
(a)
(i)
Give three items of information that are pre-printed on the cheque in magnetic ink.
1 .............................................................................................................................
................................................................................................................................
2 .............................................................................................................................
................................................................................................................................
3 .............................................................................................................................
................................................................................................................................
[3]
(ii) Describe how MICR is used to read these details from the cheque.
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
[3]
(b) Explain why magnetic ink is used rather than bar codes on a cheque.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2016
06_0417_12_2016_1.19
[2]
7
11
Name and describe three methods of implementing a new computer system. For each one describe
the type of situation where each method might be used.
1 ................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
3 ................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
[9]
© UCLES 2016
06_0417_12_2016_1.19
[Turn over
8
12 Maria is the principal of the International Municipal school. She has employed Paulo, a systems
analyst, to create a new database system to store records of her final year IGCSE students.
Examples of the details of the students which will be stored are:
Velia Grimaldi, A3058, Female, 161, Leaving
Giuseppe Campo, A3072 , Male, 177, Staying on to 6th form
Nicola Donati, B3085, Female, 173, Staying on to 6th form
Giovanni Agnelli, C3102, Male, 172, Leaving
(a) Complete the following table by entering the field names and most appropriate data type for
each field.
For any numeric field, specify the type of number.
Field name
Data type
Name
Boolean
Height
[7]
(b) Paulo wishes to save storage space. He does not change the Name field, but decides that two
other fields could have their data shortened.
Apart from the Name field, identify the two other fields and describe how the contents will be
shortened.
Field 1................................................................................................................................
Shortened form 1...............................................................................................................
Field 2................................................................................................................................
Shortened form 2...............................................................................................................
[4]
© UCLES 2016
06_0417_12_2016_1.19
9
(c) There is no key field set. Maria’s secretary typed in the data to the database in this order:
Giuseppe Campo, A3072, Male, 177, Staying on to 6th form
Giovanni Agnelli, C3102, Male, 172, Leaving
Nicola Donati, B3085, Female, 173, Staying on to 6th form
Velia Grimaldi, A3058, Female, 161, Leaving
Maria can get the database back in to the original order by sorting the data using one field.
Write down the name of this field and the order in which it will need to be sorted.
Field...................................................................................................................................
Order.................................................................................................................................
[2]
13 FTP is an internet protocol.
Explain what is meant by FTP and how it differs from HTTP.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2016
06_0417_12_2016_1.19
[4]
[Turn over
10
14 Below is a spreadsheet showing contributions to a charity from different regions.
A
B
C
D
E
F
G
H
I
The Manta Conservaon Project
1
2 Regional analysis
Regional income
Date
Rcode
Amount
3 Region
RCode
Currency
4 Africa
AF
Rand
ZAR 65.00
20/01/2016 AF
15.00
5 Asia
AS
Yuan
¥3,752.50
20/01/2016 AS
150.00
6 Australasia
AU
Dollar
$142.50
20/01/2016 NA
2000.00
7 Europe
EU
Euro
€1,076.00
20/01/2016 EU
25.00
8 North America
NA
Dollar
$2,240.50
21/01/2016 NA
120.50
9 South America
SA
Real
R$75.75
21/01/2016 SA
50.00
10
21/01/2016 AF
50.00
11
21/01/2016 AS
25.00
12
21/01/2016 EU
15.00
13
22/01/2016 AU
140.00
14
22/01/2016 EU
1000.00
15
22/01/2016 NA
20.00
16
23/01/2016 SA
25.75
17
23/01/2016 EU
16.00
18
23/01/2016 NA
100.00
19
23/01/2016 AS
55.00
20
24/01/2016 AS
12.50
21
25/01/2016 AS
10.00
22
25/01/2016 AU
2.50
23
26/01/2016 EU
20.00
24
26/01/2016 AS
3500.00
25
Number of donaons
26
21
(a) Cell E4 contains the formula =SUMIF($H$4:$H$24,B4,$I$4:$I$24)
Using cell references explain what this formula does.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(b) What formula would you expect to see in cell E8?
...........................................................................................................................................
[3]
(c) The formula in I26 only refers to the values in column I. Write down the formula you would
expect to see in cell I26
...........................................................................................................................................
© UCLES 2016
06_0417_12_2016_1.19
[2]
11
15 Information on the internet can sometimes be unreliable. Discuss ways you could minimise the
chance of finding unreliable information when searching the internet.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2016
06_0417_12_2016_1.19
[6]
[Turn over
12
16 Describe what is meant by the following file formats.
(a) .txt
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(b) .gif
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(c) .pdf
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2016
06_0417_12_2016_1.19
[2]
13
17 The following is an external stylesheet which contains a number of mistakes.
h1 {
colour: #000040;
font-family: Arial, sans serif;
font-size: 18 px;
text-align: center;
}
h2 {
color: 000000;
font-family: Times New Roman, serif;
font-size: 15px;
text-align: centre;
}
body {
background-image: url('j12backgd2.jpg');
background-color: #025fb4;
}
table {
border-collapse: collapse;
border-width: 4px;
border-style: solid;
border-color: #000000;
}
td {
border-width: 2px;
border-style: solid;
border-color: #000000;
}
Write down five mistakes which would prevent this stylesheet from working properly and, for each,
give the correction.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
3 ...............................................................................................................................................
..................................................................................................................................................
4 ...............................................................................................................................................
..................................................................................................................................................
5 ...............................................................................................................................................
..................................................................................................................................................
[5]
© UCLES 2016
06_0417_12_2016_1.19
[Turn over
14
18 Discuss why different user interfaces require the use of different types of input device.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2016
06_0417_12_2016_1.19
[8]
15
BLANK PAGE
© UCLES 2016
06_0417_12_2016_1.19
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2016
06_0417_12_2016_1.19
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
*1155407167*
INFORMATION AND COMMUNICATION TECHNOLOGY
Paper 1 Theory
0417/13
May/June 2016
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 15 printed pages and 1 blank page.
06_0417_13_2016_1.20
© UCLES 2016
[Turn over
2
1
Data can be input to a computer using different devices.
Write down the most appropriate input device which will enable you to:
(a) type an essay
...........................................................................................................................................
[1]
(b) select options from a drop down menu whilst moving the device
...........................................................................................................................................
[1]
(c) read the temperature
...........................................................................................................................................
[1]
(d) fly an aircraft in a video game.
...........................................................................................................................................
2
[1]
Tick whether the following are features of emails or traditional faxes.
email
fax
(✓)
(✓)
Transmission of messages is relatively slow.
When received data can be edited immediately using a word
processor.
Can have attached sound files.
The message is basically an image.
[2]
3
Tick whether the following statements are true or false.
true
false
(✓)
(✓)
WLAN stands for Wide Local Area Network.
A WAN often requires the use of a router.
The internet is a WAN.
A LAN usually covers a smaller area than a WAN.
[2]
© UCLES 2016
06_0417_13_2016_1.20
3
4
Different types of test data are used to test a newly developed system.
Complete the following sentences.
(a) Data which is of the correct type is called
...........................................................................................................................................
[1]
(b) Data which is outside a given range is called
...........................................................................................................................................
[1]
(c) Data which is at the boundaries of a given range is called
...........................................................................................................................................
[1]
(d) Data which has been used with the current system and the results are known is called
...........................................................................................................................................
5
[1]
Identify four uses of online booking systems.
1 ................................................................................................................................................
..................................................................................................................................................
2 ................................................................................................................................................
..................................................................................................................................................
3 ................................................................................................................................................
..................................................................................................................................................
4 ................................................................................................................................................
..................................................................................................................................................
[4]
© UCLES 2016
06_0417_13_2016_1.20
[Turn over
4
6
There are many microprocessor-controlled devices used in the modern home.
Describe four benefits in terms of lifestyle for users of such devices.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
3 ...............................................................................................................................................
..................................................................................................................................................
4 ...............................................................................................................................................
..................................................................................................................................................
[4]
7
Explain the meaning of the following email terms:
(a) cc
...........................................................................................................................................
...........................................................................................................................................
[1]
(b) bcc
...........................................................................................................................................
...........................................................................................................................................
[1]
(c) forward
...........................................................................................................................................
...........................................................................................................................................
[1]
(d) group
...........................................................................................................................................
...........................................................................................................................................
[1]
(e) attachment
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2016
06_0417_13_2016_1.20
[1]
5
8
A school library uses a computer system where there is a book file and a borrower file.
Each student has a unique membership number and each book has a unique accession number.
The accession number is the number given to a book when it is first bought by the library.
When a book is borrowed, the student has their thumbprint read by a special input device.
(a) Describe the computer processing involved when a book is borrowed.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(b) Describe the computer processing involved when a book is returned. There is no need for the
borrower to have their thumbprint read during this process.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2016
06_0417_13_2016_1.20
[2]
[Turn over
6
9
When customers use phone banking they are connected to an automated system.
(a) Give two items of data they are asked to key in to identify themselves to the system.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(b) Identify three services that they can use in phone banking.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
© UCLES 2016
06_0417_13_2016_1.20
7
10 A student exam answer sheet consists of boxes or lozenges which the student shades in to indicate
their choice of answer.
(a) Apart from the details of the test and the lozenges, give two items of information, essential to
the student, that are pre-printed on the answer sheet.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(b) Describe how Optical Mark Recognition is used to process the details from the form.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(c) Describe the drawbacks of using Optical Mark Recognition.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2016
06_0417_13_2016_1.20
[3]
[Turn over
8
11
Enrique has developed a new database system for a supermarket. Below is one record from
the database. He needs to test the validation checks that he has developed for the system.
Barcode
Supplier_code Contents
5012427141308 EZ123
Price
Lobster Bisque £2.72
Reorder_level Weight(kg)
100
0.4
(a) He designed a length check for the Barcode field. However, when he entered the code
5012472141308 by mistake, the system still accepted it.
Describe the check he could have used to prevent this error.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(b) The Reorder_level for each item is never more than 100. He developed a validation check to
make sure this is the case.
However, when he entered the number 100 it was rejected.
Name and describe the validation check he should use and explain why the number could
have been rejected.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2016
06_0417_13_2016_1.20
[3]
9
(c) He also designed a length check for the Supplier_code field. However, when he entered
EZQ23 by mistake, the system still accepted it.
Describe how he could have prevented this error.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(d) For each field write down the most appropriate data type. For any numeric field specify the
type of number.
Barcode.............................................................................................................................
...........................................................................................................................................
Supplier_code....................................................................................................................
...........................................................................................................................................
Contents............................................................................................................................
...........................................................................................................................................
Price..................................................................................................................................
...........................................................................................................................................
Reorder_level....................................................................................................................
...........................................................................................................................................
Weight(kg).........................................................................................................................
...........................................................................................................................................
[6]
© UCLES 2016
06_0417_13_2016_1.20
[Turn over
10
12 Here is a spreadsheet showing the countries which have been selected to host the Commonwealth
Games.
A
1
2 1930
3 1934
4 1938
5 1950
6 1954
7 1958
8 1962
9 1966
10 1970
11 1974
12 1978
13 1982
14 1986
15 1990
16 1994
17 1998
18 2002
19 2006
20 2010
21 2014
22 2018
23 2022
24
B
Canada
England
Australia
New Zealand
Canada
Wales
Australia
Jamaica
Scotland
New Zealand
Canada
Australia
Scotland
New Zealand
Canada
Malaysia
England
Australia
India
Scotland
Australia
South Africa
C
D
E
Canada
England
Australia
New Zealand
Wales
Jamaica
Scotland
Malaysia
India
4
2
5
3
1
1
3
1
1
South Africa
1
(a) Cells E5 to E14 contain the number of times each country has been selected to host the
Commonwealth Games.
Write down the formula which should go in cell E5 so that it can be replicated down to cell
E14.
...........................................................................................................................................
[5]
(b) Papua New Guinea are interested in bidding to host the 2026 Commonwealth Games. If they
are successful the spreadsheet will need to be updated.
Apart from those in column E, write down the cell references of those cells which will need to
change.
...........................................................................................................................................
© UCLES 2016
06_0417_13_2016_1.20
[3]
11
13 Describe what an ISP is and, apart from security measures, describe what it offers its customers.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
[3]
14 Explain how you would evaluate the reliability of information found on the internet.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2016
06_0417_13_2016_1.20
[6]
[Turn over
12
15 Describe each of the file formats giving a different use for each.
(a) .jpeg
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(b) .png
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
16
A
B
Describe, in detail, the changes that have happened to make shape A into shape B.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2016
06_0417_13_2016_1.20
[3]
13
17 In the following section of HTML markup there are a number of mistakes.
<td>
<p>Manta conservation workshops and holidays can be booked through
the Xtreme Adventure Holiday Company or by <a href="http://www.xahc.co.uk" target="_manta">
clicking here.</p>
<td>
<p><href="mailto:tmcp@cie.org.uk">Email</a> us for details of our
Manta Education Packs or <a href="mailto,tmcp@cie.org.uk,subject=Donation by
John>">click on this link<a> to discover how to donate to help us preserve
these disappearing species.</p>
</td>
Identify six mistakes which prevent this from working as intended.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
3 ...............................................................................................................................................
..................................................................................................................................................
4 ...............................................................................................................................................
..................................................................................................................................................
5 ...............................................................................................................................................
..................................................................................................................................................
6 ...............................................................................................................................................
..................................................................................................................................................
[6]
© UCLES 2016
06_0417_13_2016_1.20
[Turn over
14
18 The following are two slides from a presentation produced for young children.
Describe six improvements to the presentation that would make it more appealing to a typical adult
audience.
1 ...............................................................................................................................................
..................................................................................................................................................
2 ...............................................................................................................................................
..................................................................................................................................................
3 ...............................................................................................................................................
..................................................................................................................................................
4 ...............................................................................................................................................
..................................................................................................................................................
5 ...............................................................................................................................................
..................................................................................................................................................
6 ...............................................................................................................................................
..................................................................................................................................................
[6]
© UCLES 2016
06_0417_13_2016_1.20
15
19 Discuss the use of spreadsheet software compared to database software to store and manipulate
student data.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2016
06_0417_13_2016_1.20
[8]
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2016
06_0417_13_2016_1.20
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 2 8 3 0 3 6 0 5 2 1 *
0417/11
INFORMATION AND COMMUNICATION TECHNOLOGY
Paper 1 Theory
October/November 2016
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 13 printed pages and 3 blank pages.
DC (RW/JG) 115299/3
© UCLES 2016
[Turn over
2
1
There are a number of different internal hardware devices.
Write down the most appropriate type of internal hardware that fits the following descriptions:
(a) A volatile device that is used to store data.
...............................................................................................................................................[1]
(b) This is the main printed circuit board found in computer systems.
...............................................................................................................................................[1]
(c) A non-volatile chip that stores the start-up commands.
...............................................................................................................................................[1]
(d) This electronic device provides a computer with the ability to produce sounds.
...............................................................................................................................................[1]
2
(a) Give the type of interface shown above.
...............................................................................................................................................[1]
(b) One of the features of this type of interface is an icon. Describe what is meant by the term
icon.
...................................................................................................................................................
...............................................................................................................................................[2]
(c) Identify one way you would select an icon using this type of interface.
...............................................................................................................................................[1]
© UCLES 2016
0417/11/O/N/16
3
3
Tick whether the following statements are true or false.
true
(✓)
false
(✓)
A WAN usually connects a number of LANs.
A LAN is usually found in one building.
A WAN is a Wireless Area Network.
The internet is an example of a WLAN.
[2]
4
Tick whether the following statements are true or false, when word processing a document.
true
(✓)
false
(✓)
To set the page to landscape you select page orientation.
The gutter margin is only on the left hand side of the page.
A widow is where the last line of a paragraph appears as the first line
of text on a new page.
When you lock aspect ratio the width changes automatically as the
height is increased.
[2]
5
John is working on a school History project and saves his work. He is told by one of his teachers
that the school network has been infected by a computer virus.
(a) Explain what is meant by a computer virus and give examples of how a computer virus can
affect a computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
© UCLES 2016
0417/11/O/N/16
[Turn over
4
(b) John copies his History project from the school network onto his home computer using a pen
drive. There are many ways his home computer can become infected by a computer virus.
Describe three ways in which John could protect his home computer from being infected.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(c) The computer virus has attached itself to a file that John does not want to delete.
Describe what John should do to remove the threat of the computer virus infecting other files.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
6
Evaluation is a part of the systems life cycle.
Describe two evaluation strategies.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[2]
© UCLES 2016
0417/11/O/N/16
5
7
(a) In the answer to a question on verification, a student wrote:
‘An example of verification is proofreading’.
Explain why proofreading is not necessarily verification.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Give the name of the type of verification that involves reading the information again.
...............................................................................................................................................[1]
8
A soccer club is sending out renewal letters to all its members. The secretary of the club plans to
write a standard letter and then mail merge this with the club’s database.
(a) Describe the process of mail merging.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Having created the mail merge, the letters are sent out to the members. When the members
received the letters, they noticed there were a number of errors.
Give two precautions that the club should have taken to avoid these errors occurring.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2016
0417/11/O/N/16
[Turn over
6
(c) The soccer club wishes to publish player information on its website, but one of the members
has pointed out that in a typical data protection act, personal data must be kept confidential
and secure.
Explain what is meant by personal data and why it should be kept confidential and secure.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
9
Virtual reality has an impact on everyday life.
(a) Name two devices that could be used with a virtual reality system.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
(b) Virtual reality systems tend to be associated with gaming, but they are used in many different
areas in everyday life.
Give two uses for virtual reality in everyday life.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2016
0417/11/O/N/16
7
10 Name three health problems associated with the prolonged use of IT equipment, and for each
one, suggest a possible method to prevent the problem. The methods should be different in each
case.
Problem 1 .........................................................................................................................................
Method 1 ..........................................................................................................................................
..........................................................................................................................................................
Problem 2 .........................................................................................................................................
Method 2 ..........................................................................................................................................
..........................................................................................................................................................
Problem 3 .........................................................................................................................................
Method 3 ..........................................................................................................................................
..........................................................................................................................................................
[6]
11 Users of a weather station launch a weather balloon into the upper atmosphere.
(a) An example of a sensor attached to the weather balloon would be a pressure sensor.
Name one other sensor that should be attached to the balloon.
...............................................................................................................................................[1]
(b) The weather station continuously monitors the sensors on the weather balloon.
Describe the monitoring process.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
© UCLES 2016
0417/11/O/N/16
[Turn over
8
(c) The weather station could attach sensors to an aircraft and monitor the data as the aircraft
flies through the upper atmosphere.
Give three advantages of using the weather balloon rather than an aircraft.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...............................................................................................................................................[3]
12 Many supermarkets are now using online shopping as well as setting up stores in a mall.
Discuss the advantages and disadvantages to the store of customers using internet shopping.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
© UCLES 2016
0417/11/O/N/16
9
13 Describe the inputs and processing involved in booking tickets online for a music event.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
14 A teacher is allowing her students to use the internet, including emails, to find information for a
Geography project.
(a) Describe three strategies that students should use to stay safe when on the World Wide Web.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...............................................................................................................................................[3]
(b) Describe three strategies that students should use to stay safe when sending and receiving
emails.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2016
0417/11/O/N/16
[Turn over
10
15 Blue Screen is a music band which is rapidly gaining success. They are planning a world tour and
wish to organise their concerts efficiently. Two tables have been created in a database. One table
contains details of the venues and another table contains details of the concerts.
Table A: Venue details
Venue ID
Venue Name
City
Website
Capacity
WT1
Cambridge Open Air Arena
Cambridge
www.COAarena.com
12 500
WT2
Holmes Arena
Auckland
www.holmesarena.co.nz
12 500
WT3
Centinnel Stadium
Beijing
www.centinnel.com
17 000
WT4
Western Stadium
California
www.westernus.com
18 000
WT5
Pembroke Theatre
Cambridge
www.PCT.co.uk
15 000
Table B: Concert details
Concert ID
Location ID
Date of concert
Number of special tickets
1
WT1
01/11/2016
20
2
WT2
01/12/2016
25
3
WT3
05/12/2016
15
4
WT2
02/12/2016
25
5
WT5
02/11/2016
10
6
WT1
03/11/2016
20
7
WT3
06/12/2016
16
(a) Describe how a relational database can be created using tables A and B.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
© UCLES 2016
0417/11/O/N/16
11
(b) Flat file databases are far less efficient than relational databases but they are still used.
Describe the advantages of using a flat file database compared to a relational database.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
16 A company has decided to update its current computer system.
As part of the analysis, name two methods they could use to research their existing system.
Give one advantage and one disadvantage of each.
Method 1
..........................................................................................................................................................
Advantage
..........................................................................................................................................................
..........................................................................................................................................................
Disadvantage
..........................................................................................................................................................
..........................................................................................................................................................
Method 2
..........................................................................................................................................................
Advantage
..........................................................................................................................................................
..........................................................................................................................................................
Disadvantage
..........................................................................................................................................................
......................................................................................................................................................[6]
© UCLES 2016
0417/11/O/N/16
[Turn over
12
17 A school is considering an educational trip to Iceland. There has been a meeting of parents and
the school now requires that you set up a web page for inclusion on the school website.
Use the following data provided by the parents’ committee to design a suitable web page for use
by parents. Indicate the features that you would like to include to make it more interesting.
Students depart from the school at 7:30 am on Saturday 15 November 2016.
The hotel is the Excelsior Hotel in Reykjavik.
A trip to watch whales off Greenland has been arranged.
Students will return to the school on Saturday 22 November 2016.
If you have any concerns contact the school.
[6]
© UCLES 2016
0417/11/O/N/16
13
18 Students in a class are undertaking research for a school project. Much of the research is being
carried out using the internet.
Other than e-safety issues, discuss the benefits and drawbacks of students using the internet to
carry out the research.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
© UCLES 2016
0417/11/O/N/16
14
BLANK PAGE
© UCLES 2016
0417/11/O/N/16
15
BLANK PAGE
© UCLES 2016
0417/11/O/N/16
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2016
0417/11/O/N/16
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 2 0 5 6 8 3 6 2 4 4 *
0417/12
INFORMATION AND COMMUNICATION TECHNOLOGY
Paper 1 Theory
October/November 2016
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 14 printed pages and 2 blank pages.
DC (CW) 117035/4
© UCLES 2016
[Turn over
2
1
There are a number of different network devices associated with computers.
Give the most appropriate type of communication device that fits the following descriptions.
(a) This device connects a LAN to the internet.
...............................................................................................................................................[1]
(b) This device transmits data to specific computers in a network.
...............................................................................................................................................[1]
(c) This device broadcasts data to all computers in a network.
...............................................................................................................................................[1]
(d) This device connects one LAN to another LAN that uses the same protocol.
...............................................................................................................................................[1]
2
(a) A computer system consists of hardware and software.
Explain what is meant by software.
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Name the type of software from its description.
(i)
This type of software lets you manage the hardware and software resources.
.......................................................................................................................................[1]
(ii)
Give an example of this type of software.
.......................................................................................................................................[1]
(iii)
This type of software lets you carry out tasks such as creating a document or an image.
.......................................................................................................................................[1]
(iv)
Give an example of this type of software.
.......................................................................................................................................[1]
© UCLES 2016
0417/12/O/N/16
3
3
Tick whether the following devices are input, output or backing storage.
input
(✓)
output
(✓)
backing
storage
(✓)
Motor
CD-R
Web cam
Printer
[4]
4
Sending emails to someone involves netiquette.
Tick whether the following statements are true or false.
true
(✓)
false
(✓)
If capital letters are used in emails, it is considered as ‘shouting’.
You should always use coloured text and coloured backgrounds in emails.
You should reply to all spam emails.
bcc means blind carbon copy.
[2]
Question 5 begins on page 4
© UCLES 2016
0417/12/O/N/16
[Turn over
4
5
The directors of a multi-national car company need to communicate with each other. They have
decided that the best way to do this is through web-conferencing.
(a) Describe web-conferencing and how it could be used in this scenario.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) The directors wish to have a conference with their managers in other countries and are
considering the use of video-conferencing.
Name three pieces of hardware that would be needed in order to hold a video-conference.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2016
0417/12/O/N/16
5
(c) Describe three drawbacks of setting up and using video-conferencing.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
6
Tick the most appropriate storage medium for each of the following uses.
Fixed
Hard Disk
(✓)
Blu-ray
(✓)
Magnetic
Tape
(✓)
Memory
Card
(✓)
Storing a database of books in a school library
Storing photographs in a digital camera
Companies distributing HD movies
Storing the backup of a file server
[4]
© UCLES 2016
0417/12/O/N/16
[Turn over
6
7
A teacher has produced a piece of software and uses it to record exam marks. Each exam has a
total of 100 marks available. If a student does not take the examination then the mark awarded is 0.
A
B
C
2
Name of Student
Examination Mark
Pass or Fail
3
Candidate A
20
4
Candidate B
70
5
Candidate C
45
D
1
6
7
8
9
(a) Write a formula that would be entered in cell C3 to display the word pass if the value in B3 is
more than 75 marks or the word fail if it is not.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2016
0417/12/O/N/16
7
(b) The teacher wishes to test a formula on the spreadsheet and uses normal, abnormal and
extreme test data.
Describe each of the following terms.
Normal Test Data ......................................................................................................................
...................................................................................................................................................
Abnormal Test Data ..................................................................................................................
...................................................................................................................................................
Extreme Test Data ....................................................................................................................
...................................................................................................................................................
[3]
8
Biometrics have replaced user IDs and passwords in a large number of systems.
Discuss the advantages and disadvantages of using biometric systems rather than more traditional
security methods.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
© UCLES 2016
0417/12/O/N/16
[Turn over
8
9
Many countries have copyright legislation which applies to the purchasing of software.
Give three actions that would break copyright.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
[3]
10 Members of a US Conservation Unit recently discovered a species of frog new to New York. They
identified the frog using an expert system called ARK.
(a) Describe how an expert system can be used to help identify a newly discovered type of
animal.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Identify two other applications which make use of expert systems.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2016
0417/12/O/N/16
9
(c) A developer has created a plan for a new database.
Field Name
Data Type
Length of Field
Animal_ID
Text
5
Name_of_animal
Text
25
Animal_endangered?
Boolean
Years_on_register
Numeric
Comment
2 letters followed by
a 3 digit number
For each named field, give an appropriate validation check the developer should use.
Field Name
Validation Check
Animal_ID
Name_of_animal
Animal_endangered?
Years_on_register
[4]
(d) A report is generated from the results. The report contains headers and footers.
Explain, using examples, why headers and footers are used.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
© UCLES 2016
0417/12/O/N/16
[Turn over
10
11 A manager of a computer store has created a relational database to keep track of its orders. She
has created two tables that are linked together.
Table A stores the products.
Table B stores the order details.
The following data shows some records from the database.
Table A: products
Product_ID
Product_name
Unit_price
1232
PC Base unit
$300
1246
Monitor TFT
$250
1678
Mouse
$9
2314
Keyboard
$9
3214
Laser printer
$250
Table B: order details
Order_ID
Product_ordered
Quantity
1231
1232
1
1233
1246
10
1234
1678
15
1235
2314
4
1236
2314
16
1237
3214
20
(a) Name the most suitable primary key in the products table.
...............................................................................................................................................[1]
(b) Name a suitable foreign key in the order details table.
...............................................................................................................................................[1]
(c) On the data shown in the tables above, the following search is to be carried out:
(Unit_price>$250)
Write down the Order_ID resulting from this search.
...............................................................................................................................................[1]
© UCLES 2016
0417/12/O/N/16
11
(d) On the data shown in the tables at the start of question 11, the following search is to be
carried out:
(Product_ID>2000) AND (Quantity<20)
Write down the Order_ID(s) resulting from this search.
...............................................................................................................................................[2]
(e) The store has created a report with a new field called total_price to be calculated at run time.
This field will contain the number of units ordered multiplied by the price of each unit.
Write an expression to produce this result.
...................................................................................................................................................
...............................................................................................................................................[2]
12 Explain, using examples, the difference between a function and a formula in a spreadsheet.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
13 A new system has been developed and documentation has been produced. There are two types of
documentation; user and technical.
(a) Explain what technical documentation is used for.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2016
0417/12/O/N/16
[Turn over
12
(b) Give four examples of the items found in technical documentation.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
14 There are several security issues surrounding the use of smartphones. These include smishing
and pharming.
(a) Describe different security measures that can be put into place to stop smishing or pharming
attacks.
Smishing ...................................................................................................................................
...................................................................................................................................................
Pharming ..................................................................................................................................
...................................................................................................................................................
[2]
(b) Cookies are sometimes seen as a security threat when in reality they are only a nuisance.
Explain, using an example, what cookies are and why they are important to companies.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2016
0417/12/O/N/16
13
15 Explain the differences between a blog and a wiki.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
16 (a) Describe what is meant by an intranet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Describe what is meant by the internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2016
0417/12/O/N/16
[Turn over
14
17 It has been announced that the UK banking industry will not now remove the use of cheques.
As more and more people are using debit cards to pay for goods, the cheque was to be phased
out in the UK by 2018. The use of cheques for transactions is declining but still available.
Compare and contrast the use of debit cards and cheques to carry out transactions.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
© UCLES 2016
0417/12/O/N/16
15
BLANK PAGE
© UCLES 2016
0417/12/O/N/16
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2016
0417/12/O/N/16
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 1 3 9 6 9 8 6 5 5 3 *
0417/13
INFORMATION AND COMMUNICATION TECHNOLOGY
Paper 1 Theory
October/November 2016
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
This document consists of 14 printed pages and 2 blank pages.
DC (RW/JG) 115300/3
© UCLES 2016
[Turn over
2
1
Tick whether the following statements are true or false.
true
(✓)
false
(✓)
Tablet computers have touch screens.
Smartphones will only connect to the internet through WiFi.
A tablet computer has a separate keyboard.
Smartphones use a touchpad.
[2]
2
(a) Give the type of interface shown above.
...............................................................................................................................................[1]
(b) Give a disadvantage of using this type of user interface.
...................................................................................................................................................
...............................................................................................................................................[1]
(c) Another type of interface is a graphical user interface (GUI).
Tick whether the following statements are true or false.
true
(✓)
false
(✓)
A GUI involves the use of windows and menus.
User interaction with a GUI is intuitive.
A GUI takes up a lot of memory and resources.
Users have to learn a list of system commands in order to use a GUI.
[2]
© UCLES 2016
0417/13/O/N/16
3
3
Tick whether the following statements are true or false.
true
(✓)
false
(✓)
ROM is Real Optical Memory.
RAM stores the instructions you are currently working on.
ROM stores the BIOS.
RAM allows the user to read and write data.
[2]
4
Different devices connected to the computer have a number of different characteristics.
(a) Name the type of printer that is best suited to operate in harsh conditions.
...............................................................................................................................................[1]
(b) Name a type of monitor that can reduce the effects of eye strain.
...............................................................................................................................................[1]
(c) Name the type of printer that produces a solid object.
...............................................................................................................................................[1]
(d) Name the type of monitor that is an input device on which output can be seen and is found in
a public information system.
...............................................................................................................................................[1]
5
A new system is being implemented in a company. The systems analyst has a number of ways
that the system can be implemented.
For each named method, give an advantage of using the implementation over the others.
Parallel running ................................................................................................................................
..........................................................................................................................................................
Direct changeover ............................................................................................................................
..........................................................................................................................................................
Phased implementation ....................................................................................................................
......................................................................................................................................................[3]
© UCLES 2016
0417/13/O/N/16
[Turn over
4
6
In many countries, hacking of computer systems is an offence.
(a) Explain, using examples, the term hacking.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) Describe the measures that should be taken to help protect data from being hacked.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2016
0417/13/O/N/16
5
7
This email has been received by a bank customer who believes it may be fraudulent.
Give three reasons why the customer may be suspicious.
From: no_reply@manger.tawarabank.com
Subject: Account Status
Dear Costumer,
Due to resent activity on account, we have reason to believe that your account has been
compromised . For your security, we have temporariley prevented access to your account.
Tawara Bank safeguards your account when there is a possibility that someone other than you
tried to log in. You may be getting this message because you signed in from a different location
or device. If this is the case, your access may be restored when you log in your username and
passward.. For immediate access, you are required to follow the instruction below to confirm
your account in order to secure your personal account information.
Click here to log In to your Account
If you have any problems trying to log in to your account, please reply to this email giving your
username and passward and we will check your setting.
Regards, Paige Turner
Chief Customer Officer
CardHolder Services
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
[3]
© UCLES 2016
0417/13/O/N/16
[Turn over
6
8
Uniform Resource Locators (URL) are used to locate web addresses and resources. In order to
get to the weather forecast for Auckland, New Zealand, you would enter:
http://www.bbc.com/weather/2193733
(a) Describe each of the following elements in the web address.
http:// .........................................................................................................................................
...............................................................................................................................................[1]
www.bbc.com ............................................................................................................................
...............................................................................................................................................[1]
weather .....................................................................................................................................
...............................................................................................................................................[1]
2193733 ....................................................................................................................................
...............................................................................................................................................[1]
(b) The 2016 CIE IGCSE ICT syllabus can either be found using a web browser or a search
engine.
Describe two advantages of using a web browser rather than a search engine.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
9
You have completed a word processed report for a History project on the First World War. You set
the computer to check the grammar and spelling.
Explain why you still need to check the spelling and grammar visually.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[3]
© UCLES 2016
0417/13/O/N/16
7
10 There are several ways in which members of an organisation can organise meetings. These
include video-, audio- or web-conferencing.
(a) An organisation is planning an important meeting with the Directors of the three main offices.
They are going to set up an audio-conference.
Describe the process of setting up this type of conference.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) The organisation has a computer network which is connected to the internet. The router
contains a firewall.
Explain why a firewall is needed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
© UCLES 2016
0417/13/O/N/16
[Turn over
8
11 The headteacher of a school has decided to allow all data about the students to be backed up
onto the cloud.
(a) Explain the ICT term cloud.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Even though the cloud appears to be an excellent resource, it has many problems.
Discuss the benefits and drawbacks of storing data in the cloud.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
© UCLES 2016
0417/13/O/N/16
9
12 A householder has installed a computer controlled burglar alarm.
Describe the processing involved in a computer controlled burglar alarm.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[5]
13 Name three components of an expert system.
1 .......................................................................................................................................................
2 .......................................................................................................................................................
3 .......................................................................................................................................................
[3]
14 Car production lines use robots to manufacture the vehicles. The robots have devices attached to
their arms to help in the manufacturing process.
(a) For each of the named devices, describe their use on a car production line.
Video camera ............................................................................................................................
...............................................................................................................................................[1]
Light sensor ..............................................................................................................................
...............................................................................................................................................[1]
Pressure sensor ........................................................................................................................
...............................................................................................................................................[1]
© UCLES 2016
0417/13/O/N/16
[Turn over
10
(b) Give three advantages to the company of using robots rather than humans to manufacture
cars.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(c) Give three disadvantages to the company of using robots rather than humans to manufacture
cars.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(d) Cars have to be designed before they can be manufactured. 3D printers can be used to
produce models of a car.
Describe the process involved in producing the models.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2016
0417/13/O/N/16
11
15 (a) A router is connected to a LAN.
Describe the function of a router.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Different methods can be used to connect computers to networks.
Describe two advantages for each of the following methods.
WiFi ...........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
Satellite .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
3G / 4G ......................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2016
0417/13/O/N/16
[Turn over
12
16 The following is part of a household budget spreadsheet. Cells B9 and B14 contain formulas. The
owner wishes to test the spreadsheet which must follow the following rules:
•
•
No individual outgoings can be greater than $100
The balance can be negative or positive
A
1
B
C
Household budget
2
3
Outgoings
4
Heating
$45.00
5
Food
$80.00
6
Travel
$35.00
7
Utilities
$61.00
8
Clothes
$40.00
9
$261.00
10
Income
11
Total Salary
$280.00
Balance
$19.00
12
13
14
15
(a) Describe four testing strategies you could use to test the model.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2016
0417/13/O/N/16
13
(b) Describe how you would change the spreadsheet so that it alerts the user if any outgoing is
greater than $100.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
17 A new toll road that drivers pay to use has just opened. The company that owns the road uses
Electronic Number Plate Recognition Systems to collect payments from drivers automatically.
Describe how an Electronic Number Plate Recognition System works.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
18 For each of the following safety issues suggest a possible strategy for preventing the problem.
Electrocution ....................................................................................................................................
......................................................................................................................................................[1]
Fire ...................................................................................................................................................
......................................................................................................................................................[1]
Tripping over trailing leads ...............................................................................................................
......................................................................................................................................................[1]
Heavy equipment falling ...................................................................................................................
......................................................................................................................................................[1]
© UCLES 2016
0417/13/O/N/16
[Turn over
14
19 The director of a major electronics company announced that ‘homes are about to become much
smarter’. He was talking about the use of home appliances that could connect to the internet.
These include central heating systems, ovens, televisions and fridges.
Devices like these need to connect to the internet. Discuss the advantages and disadvantages of
connecting them to the internet.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
© UCLES 2016
0417/13/O/N/16
15
BLANK PAGE
© UCLES 2016
0417/13/O/N/16
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2016
0417/13/O/N/16
INFORMATION AND COMMUNICATION
TECHNOLOGY
Paper 1 Theory
2015
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 6 0 2 1 8 2 3 5 1 7 *
0417/12
INFORMATION AND COMMUNICATION TECHNOLOGY
Paper 1
February/March 2015
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
For Examiner’s Use
This document consists of 15 printed pages and 1 blank page.
DC (LK/FD) 101312/3
© UCLES 2015
[Turn over
2
1
This diagram shows a computer controlled greenhouse.
/LJKW
&RPSXWHU
6SULQNOHU
0RWRU
+XPLGLW\VHQVRU
7HPSHUDWXUH
VHQVRU
1XPEHUSDG
+HDWHU
/LJKWVHQVRU
(a) Identify three input devices which are shown in the diagram above.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(b) Identify three output devices which are shown in the diagram above.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
© UCLES 2015
0417/12/F/M/15
3
2
Tick the most appropriate method of storing data for each of the following uses.
Memory
card
✓
Use
Magnetic
Tape
✓
Blu-ray
Disc
✓
Storing photos in a camera
Storing file server backups
Storing high definition movies
Storing large numbers of payroll records
[4]
3
Complete the table by identifying the most appropriate input device for each type of application.
Application
Device
Inputting diagrams as they are being drawn
Inputting printed text to a computer to be processed by another
software package
Inputting moving pictures, often pre-recorded, into a computer
Used by a pilot to control a flight simulator
[4]
4
There are a number of different types of area networks.
Tick whether the following statements apply to a WAN, LAN, or a WLAN.
WAN
✓
LAN
✓
WLAN
✓
This type of network usually requires the use of WiFi
Usually is cabled and often housed in a single building
Covers a large area and is often connected using a router
Requires the use of Wireless Access Points (WAPs)
[4]
© UCLES 2015
0417/12/F/M/15
[Turn over
4
5
Complete the sentences using words from the list below.
(a) The device used for switching channels on a
television is called
................................................................
[1]
(b) A method of inputting answers from a
candidate’s exam paper is called
................................................................
[1]
(c) A printer which is suitable for producing large
volumes of high quality printout is called
................................................................
[1]
ROM
a remote control
RAM
a dot matrix printer
a trackerball
OMR
a laser printer
an inkjet printer
© UCLES 2015
0417/12/F/M/15
5
6
Describe how a microprocessor uses the data from input devices to control an automatic cooker.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
© UCLES 2015
0417/12/F/M/15
[Turn over
6
7
A floor turtle can use the following instructions:
INSTRUCTION
MEANING
FORWARD n
Move n mm forward
BACKWARD n
Move n mm backward
LEFT t
Turn left t degrees
RIGHT t
Turn right t degrees
PENUP
Lift the pen
PENDOWN
Lower the pen
REPEAT n
Repeat the following instructions n times
END REPEAT
Finish the REPEAT loop
NOT TO
SCALE
120°
60°
40 mm
100 mm
50 mm
Start
A student has written the following set of instructions to make the floor turtle draw these shapes.
The turtle is facing up at the start.
1.
PENDOWN
2.
LEFT 90
3.
REPEAT 5
4.
FORWARD 50
5.
RIGHT 60
6.
PENUP
7.
PENDOWN
8.
RIGHT 120
9.
FORWARD 50
10.
END REPEAT
Although the first two instructions are correct, this set of instructions would not draw the shapes
exactly as shown. Three instructions have been missed out and two are incorrect.
© UCLES 2015
0417/12/F/M/15
7
(a) Write down the three missing instructions and indicate where they should be positioned in
the list of instructions provided.
1. ...............................................................................................................................................
...................................................................................................................................................
2. ...............................................................................................................................................
...................................................................................................................................................
3. ...............................................................................................................................................
...................................................................................................................................................
[3]
(b) Identify the two incorrect instructions and for each, state the correct instruction to be used.
1. ...............................................................................................................................................
...................................................................................................................................................
2. ...............................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2015
0417/12/F/M/15
[Turn over
8
8
(a) Identify five different items of data that are input at an ATM when cash is withdrawn by a
customer or read from the card.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
4 ................................................................................................................................................
5 ................................................................................................................................................
[5]
(b) Discuss the advantages and disadvantages of the use of a local ATM to withdraw cash rather
than travelling to a bank.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
© UCLES 2015
0417/12/F/M/15
9
9
WBA is a company that makes little profit. Its newly commissioned ICT system is ready to be
implemented. It needs the new system to be in use as soon as possible.
Describe the advantages and disadvantages of using parallel running compared with direct
changeover as a method of implementing the system. Choose which of these two methods of
implementation WBA should use, giving reasons for your choice.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
© UCLES 2015
0417/12/F/M/15
[Turn over
10
10 Most smart phones can carry out many functions which, until recently, only a computer could
perform.
Explain why computers of all types are still needed.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[7]
11 Most computers have backing storage as well as main/internal memory (RAM/ROM).
(a) Explain why backing storage is needed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
© UCLES 2015
0417/12/F/M/15
11
(b) Describe why main/internal memory is needed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
12 A headteacher has decided to arrange delivery of hard copy versions of the school magazine as
well as placing it on the school website.
(a) Give two reasons why he has chosen to do this.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Give three disadvantages of producing the hard copies.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2015
0417/12/F/M/15
[Turn over
12
13 (a) Using the example of COUNTIF(A2:A10,”<31”), explain how the COUNTIF function works.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Rupinder has created a spreadsheet showing the following data and formula.
'
1DPH
$YWDU.KROL
6XUMHHW6LQJK
-DZDKDU1HKUX
6XQLO.DSRRU
-DVYLU6KHUJLOO
,VKLWD'XWWD
1LNKLO%DQHUMHH
$QLWD0HUFKDQW
6DQMLYH.XPDU
(i)
(
)
0RQWKVLQHPSOR\PHQW
*
&2817,) ((µ µ
Write down the value that would be contained in cell G2.
.......................................................................................................................................[1]
(ii)
Rupinder subtracts the value in part (i) from 9 (the number of workers). He thinks this will
tell him the number of workers who have been in employment for more than 33 months.
Explain why his reasoning does not work.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
© UCLES 2015
0417/12/F/M/15
13
14 The doctors at the Mumbai Clinic have commissioned a knowledge engineer to create an expert
system to help them with their diagnoses of patient illnesses.
(a) Describe how such a system would be created.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(b) Give two other applications apart from diagnostic systems which make use of expert systems.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
© UCLES 2015
0417/12/F/M/15
[Turn over
14
15 Recaud Inc. stock many CDs. Below is a small selection of CDs stored on their database.
ID
number
Artist_name
CD_title
Price
(Rs)
Year_released
Number_of_tracks
1
Nayan Pancholi
Maa Na
Nayan
249.00
2012
29
2
Nayan Pancholi,
Gargi Vora
Maa Amba
145.00
2013
7
3
Lakshmi Shankar
Ecstasy
120.00
2012
2
4
Anindo Chatterjee
Anindo and
His Tabla
230.00
1991
7
5
Jagjit Singh
Greatest Hits
255.00
2011
24
(a) Write down the most suitable data type for the following fields.
CD_title
..........................................................................................................
Price (Rs)
..........................................................................................................
Year_released
..........................................................................................................
Number_of_tracks
..........................................................................................................
[4]
(b) Describe the range check which could be carried out on the Price (Rs) field. The maximum
price and the minimum price are shown in the table above.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2015
0417/12/F/M/15
15
(c) The owner of the shop, Alam, receives requests from customers about the CDs he has in
stock. He makes a note of these requests using comparison and Boolean operators. For
example, a customer might ask for a CD which was released after 2002 and has at least 7
tracks. Alam would write this down as:
Year_released > 2002 AND Number_of_tracks >= 7
(i)
Write down a request for a customer who wants a list of all the CDs which were released
before 2007. This list must also contain all the CDs which cost at least 145 rupees.
.......................................................................................................................................[5]
(ii)
Write down the ID numbers of those records which would match your criteria in (i).
.......................................................................................................................................[2]
16 Explain what is meant by copyright.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[2]
© UCLES 2015
0417/12/F/M/15
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2015
0417/12/F/M/15
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
*1300317647*
INFORMATION AND COMMUNICATION TECHNOLOGY
Paper 1
0417/11
May/June 2015
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This document consists of 13 printed pages and 3 blank pages.
06_0417_11_2015_1.14
© UCLES 2015
[Turn Over
2
1
This diagram shows a laptop computer being used in a measuring experiment.
screen
printer
pen
drive
DVD drive
touchpad
keyboard
sensor
(a) Apart from the keyboard, name two input devices shown in the diagram above.
1.........................................................................................................................................
2.........................................................................................................................................
[2]
(b) Name two output devices shown in the diagram above.
1.........................................................................................................................................
2.........................................................................................................................................
[2]
(c) Name two storage devices shown in the diagram above.
1.........................................................................................................................................
2.........................................................................................................................................
2
[2]
Tick the most appropriate method of inputting data for the following uses.
Use
MICR
✓
Trackerball
✓
Sensor
✓
Reading data from a cheque
Inputting the temperature of a greenhouse
People with limited motor skills using computers
Inputting the amount of humidity in a weather station
[4]
© UCLES 2015
06_0417_11_2015_1.14
3
3
Complete the table by identifying the most appropriate output device for each type of application.
Application
Device
Produces very high quality printing where speed is not an issue
Production of continuous stationery where noise is not an issue
Produces rapid, high quality and high volume printing
Produces very large printouts such as size A0
[4]
4
Tick which of these statements apply to a Blog, a Microblog or a Wiki.
Blog
✓
Microblog
✓
Wiki
✓
Very restricted on the size of post
Allows readers to edit posts
Entries are not usually in chronological order
Very difficult to customise
[4]
5
Complete each of the sentences using the most appropriate word from the list below.
batch
sensor
OCR
fan
MICR
direct
serial
motor
(a) The type of processing used for processing bank cheques is called ....................
[1]
(b) The type of access used on a magnetic hard disc is called ....................
[1]
(c) An item of hardware which is used to open windows is called a ....................
[1]
© UCLES 2015
06_0417_11_2015_1.14
[Turn Over
4
6
A floor turtle can use the following instructions:
INSTRUCTION
MEANING
FORWARD n
Move n mm forward
BACKWARD n
Move n mm backward
LEFT t
Turn left t degrees
RIGHT t
Turn right t degrees
PENUP
Lift the pen
PENDOWN
Lower the pen
REPEAT n
Repeat the following instructions n times
END REPEAT
Finish the REPEAT loop
30 mm
30 mm
30 mm
10 mm
20 mm
Start
Finish
Complete the set of instructions to draw this shape by filling in the blank lines. Do not use additional
lines.
PENDOWN
............................................
LEFT 90
............................................
FORWARD 20
............................................
RIGHT 90
............................................
PENUP
............................................
............................................
FORWARD 30
[6]
© UCLES 2015
06_0417_11_2015_1.14
5
7
A home is fitted with a microprocessor-controlled burglar alarm system. It is not connected to a
police station.
(a) Tick three sensors which would be used in such a system.
✓
Pressure sensor
Oxygen level sensor
Wind speed sensor
Sound sensor
Body sensor
Moisture sensor
Infra-red sensor
Touch sensor
[3]
(b) Describe how a microprocessor-controlled burglar alarm system operates, referring to those
sensors you identified in part (a).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2015
06_0417_11_2015_1.14
[5]
[Turn Over
6
8
The owner of a sports club has recently had a new computerised stock control system installed.
He employed a systems analyst to research the existing system and then install the new system.
(a) Tick the relevant stage of the systems analysis and design (systems life cycle) for each of the
following activities.
Activity
Analysis
✓
Design
✓
Evaluation
✓
Interviewing the users of the new system
Interviewing the users of the existing system
Planning the validation routines
Examining existing documents
[4]
(b) Before the system was installed, the systems analyst had to decide on a method of
implementation.
Name and describe three methods of implementation.
Name ................................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
Name ................................................................................................................................
Description.........................................................................................................................
...........................................................................................................................................
Name.................................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
© UCLES 2015
06_0417_11_2015_1.14
[6]
7
(c) When the system was implemented, the system analyst gave some documentation to the
sports club owner.
Name three items found in the technical documentation of this system.
1. .......................................................................................................................................
...........................................................................................................................................
2. .......................................................................................................................................
...........................................................................................................................................
3. .......................................................................................................................................
...........................................................................................................................................
[3]
(d) Name three items in the user documentation which are not present in the technical
documentation.
1. .......................................................................................................................................
...........................................................................................................................................
2. .......................................................................................................................................
...........................................................................................................................................
3. .......................................................................................................................................
...........................................................................................................................................
© UCLES 2015
06_0417_11_2015_1.14
[3]
[Turn Over
8
9
A headteacher wants to store details of his students’ attendances in a spreadsheet. He has typed
in the details of two students so far. Each student is identified by a student ID which consists of
one letter followed by 6 digits. The number of possible attendances is recorded along with each
student’s actual number of attendances.
1
A
B
C
D
E
Student name
Student ID
Possible
attendances
Actual
attendances
2
3
Maria Gonzales
L543789
80
72
4
Clive Lloyd
M351209
80
66
5
6
(a) The headteacher wants to ensure the Student ID is accurately entered.
Describe a method of verifying the input.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(b) He wants the spreadsheet to perform a calculation of the percentage attendance of Maria
Gonzales in E3.
Explain how he would use the spreadsheet to do this.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2015
06_0417_11_2015_1.14
[2]
9
(c) He now wants to add another 18 students to the spreadsheet.
Explain how he could calculate the percentage attendance for each student by only using a
computer mouse.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(d) Give two reasons, apart from cost, why computer models are often used instead of the real
thing.
1. .......................................................................................................................................
...........................................................................................................................................
2. .......................................................................................................................................
...........................................................................................................................................
[2]
10 Tick four drawbacks to car manufacturers of introducing robots on production lines.
✓
Redundancy payments to previous workers are expensive
The cars produced are not of a consistent standard
Robots are unable to think for themselves
Robots do not go on strike
Robots are expensive to buy
Mistakes are never made
Maintaining robots costs money
Car workers have to be paid more
[4]
© UCLES 2015
06_0417_11_2015_1.14
[Turn Over
10
11
(a) Explain what is meant by Spam.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(b) Describe how web pages can be used to trick users into giving personal information.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
12 Alfonso’s family has three computers. He wants each member of his family to be able to access
internet shopping.
(a) Identify three items of hardware he may need to purchase in order to set up a computer network
that will enable this to happen.
1. .......................................................................................................................................
2. .......................................................................................................................................
3. .......................................................................................................................................
[3]
(b) Alfonso’s teenage daughter uses her computer to create and send work to school.
Describe three other ways she could make appropriate use of the internet.
1. .......................................................................................................................................
...........................................................................................................................................
2. .......................................................................................................................................
...........................................................................................................................................
3. .......................................................................................................................................
...........................................................................................................................................
© UCLES 2015
06_0417_11_2015_1.14
[3]
11
(c) Describe a strategy that Alfonso’s daughter could use to back up her school work.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(d) The bank that Alfonso uses only requires customers to log into their account by inputting a
user id and password.
Explain why this is not very secure and discuss other ways the bank could identify the customer
securely.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2015
06_0417_11_2015_1.14
[6]
[Turn Over
12
13 Ahmed has asked Anna, a systems analyst, to create a new database system for his video rental
business. He rents out films in DVD and Blu-ray formats only. Here are some of the questions
customers ask:
1.
Do you have the film ‘Muppets most wanted’ in Blu-ray format?
2.
Do you have any films which I can rent for less than $3?
3.
Do you have any films directed by Stephen Spielberg?
(a) Complete the design table below by filling in the field names and data types. Use the most
appropriate data type to create a database which would answer the questions shown above.
Do not use spaces in field names.
Field name
Data type
Film_title
Name_of_director
[6]
(b) Describe how Ahmed would use the finished database to produce a report, without using
word processing software, to answer the second question above.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
© UCLES 2015
06_0417_11_2015_1.14
[4]
13
14 A lending library has introduced an e-book borrowing facility. Borrowers will be able to download
a book to their tablet computer or e-book reader. It will automatically remove itself from the device
after the loan period has expired.
Discuss the advantages and disadvantages of such a system to the library and the borrower.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
© UCLES 2015
06_0417_11_2015_1.14
[6]
14
BLANK PAGE
© UCLES 2015
06_0417_11_2015_1.14
15
BLANK PAGE
© UCLES 2015
06_0417_11_2015_1.14
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2015
06_0417_11_2015_1.14
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 9 9 3 7 1 3 8 9 0 0 *
INFORMATION AND COMMUNICATION TECHNOLOGY
Paper 1
0417/12
May/June 2015
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This document consists of 13 printed pages and 3 blank pages.
DC (ST/SG) 101050/2
© UCLES 2015
[Turn over
2
1
This diagram shows a tower PC.
(a) Name two input devices apart from a keyboard and mouse, which could connect directly to
the tower.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Name two storage devices which would be available in the PC shown above.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(c) Name two output devices which could connect directly to the PC shown above.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
© UCLES 2015
0417/12/M/J/15
3
2
Below is a list of statements. Each statement is true for only one of the given methods of
implementation. Tick the method which matches the statement.
Parallel
running
✓
Direct
Changeover
✓
Pilot
running
✓
All of the old and new systems run at the same time.
If the system fails in one branch, the rest of the
company is not affected.
The new system has to be completely free of errors
before implementation.
The benefits of the new system are available
immediately.
[4]
3
Below is a list of uses of ICT.
Tick the device which would be most appropriate for each activity.
Input
device
✓
Output
device
✓
Storage
device
✓
Making a backup of work
Typing a document
Printing out student records
Reading details from a bar code
Making a soft copy for future use
[5]
4
Tick whether the following items are found in user documentation only, technical documentation
only or are found in both.
User
✓
Technical
✓
Both
✓
Systems flowchart
How to save a document
List of variables
The purpose of the system
[4]
© UCLES 2015
0417/12/M/J/15
[Turn over
4
5
There are a number of methods of direct data entry.
Complete the sentences using words from the list below.
(a) The method of inputting bank codes from the bottom of a cheque is called
............................................................[1]
(b) The device used for inputting details from a label on a product is called
............................................................[1]
(c) The device used for inputting data directly from a bank card is called
............................................................[1]
6
a bar code reader
a PIN pad
OMR
MICR
a keyboard
a graphics tablet
a mouse
a chip reader
A floor turtle can use the following instructions:
INSTRUCTION
MEANING
FORWARD n
Move n mm forward
BACKWARD n
Move n mm backward
LEFT t
Turn left t degrees
RIGHT t
Turn right t degrees
PENUP
Lift the pen
PENDOWN
Lower the pen
35 mm
10 mm
20 mm
10 mm
15 mm
Start
The turtle is facing up the page and the pen is up.
© UCLES 2015
0417/12/M/J/15
Finish
5
A student has written the following set of instructions to make the floor turtle draw the above
shape.
1.
PENDOWN
2.
LEFT 90
3.
FORWARD 15
4.
RIGHT 90
5.
PENUP
6.
FORWARD 20
7.
RIGHT 90
8.
PENUP
9.
FORWARD 90
10. RIGHT 35
11. FORWARD 20
Although the first four instructions are correct, this set of instructions would not draw the shape
exactly as shown. One instruction has been missed out and four are incorrect.
(a) Write down the missing instruction and indicate where it should be positioned in the list of
instructions provided.
...................................................................................................................................................
...............................................................................................................................................[1]
(b) Identify the four incorrect instructions and state the correct instructions to be used.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2015
0417/12/M/J/15
[Turn over
6
7
A microprocessor controlled washing machine is fitted with a number of sensors.
(a) Tick three sensors which would be used in such a system.
✓
Pressure sensor
Height sensor
Wind speed sensor
Sound sensor
Temperature sensor
Moisture sensor
Cold sensor
Detergent sensor
[3]
(b) Describe the actions taken by a microprocessor during a wash cycle, based on the readings
from those sensors identified in part (a).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
© UCLES 2015
0417/12/M/J/15
7
8
A bank has introduced a system whereby its customers will use contactless smart cards to make
purchases. This method of payment involves customers holding their card close to a reader at
shopping outlets and restaurants.
Discuss the advantages and disadvantages of this method of payment compared to using chip
and PIN cards.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
© UCLES 2015
0417/12/M/J/15
[Turn over
8
9
(a) Explain how a VLOOKUP function works, using the example of VLOOKUP(38,A2:C10,3,FALSE).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) A spreadsheet contains the following data and formula.
D
1 Months in employment
2 31
3 34
4 39
5 43
6 32
7 35
8 38
9 33
10 23
11
12
E
F
:ŽďĚĞƐĐƌŝƉƟŽŶ Name
John
Teacher
Avtar
Chemist
Ahmed
Engineer
Ho
Lecturer
David
Bricklayer
Jose
Manager
Simon
Shopkeeper
James
Zoo owner
/ŶƟŬŚĂď
Explorer
G
H
I
=VLOOKUP(33,D2:F10,3)
Explain why the cell H2 might not contain James. Suggest the value that would be contained
in that cell, giving reasons why.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
© UCLES 2015
0417/12/M/J/15
9
10 Explain how the number of jobs available to workers has been affected by the use of ICT in
commerce and industry, using specific examples. Refer in your answer to jobs created as well as
job losses.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[5]
11 Aftab wants to create a network using a PC and two laptop computers he has bought for his family.
All have network cards fitted. He has already purchased network protection software. He wishes to
use them for online banking.
Name and describe the use of four additional items, apart from cables, he would need in order to
set up this network.
Item 1 ...............................................................................................................................................
Use ...................................................................................................................................................
..........................................................................................................................................................
Item 2 ...............................................................................................................................................
Use ...................................................................................................................................................
..........................................................................................................................................................
Item 3 ...............................................................................................................................................
Use ...................................................................................................................................................
..........................................................................................................................................................
Item 4 ...............................................................................................................................................
Use ...................................................................................................................................................
..........................................................................................................................................................
[8]
© UCLES 2015
0417/12/M/J/15
[Turn over
10
12 A school in the UK holds a sports day every year. Students compete in a number of athletics
events during the day.
The results of all events, together with suitable photographs, are to be included in the school
newsletter on its website. Initially the results will be stored in a spreadsheet.
Describe how the sports day part of the newsletter will be produced.
..........................................................................................................................................................
.........................................................................................................................................................................
.........................................................................................................................................................................
.........................................................................................................................................................................
.........................................................................................................................................................................
.........................................................................................................................................................................
.........................................................................................................................................................................
.........................................................................................................................................................................
.........................................................................................................................................................................
.........................................................................................................................................................................
.........................................................................................................................................................................
......................................................................................................................................................[6]
13 Tick three drawbacks in terms of costs to banks of introducing online banking.
✓
Initial purchase of hardware and software is expensive
Bank workers will have to be paid more
Extra buildings will be need to be rented
System maintenance costs may be high
Cost of lighting and electricity will be higher
More cashiers will need to be employed
More security staff will need to be employed
Redundancy payments will need to be made to cashiers who are now
unemployed
[3]
© UCLES 2015
0417/12/M/J/15
11
14 A headteacher wishes to store details of her students in a computer database. She has been
given an example of one student record by the school secretary:
Strauss, Johann, SR132516, 83, 01/09/2011
This corresponds to family_name, first_name, Student_Id, Maths_test_score, joined_the_school.
The file is currently stored in the form of plain text with each record separated by a line break.
(a) Give a file extension which is appropriate for this file.
...............................................................................................................................................[1]
(b) For each field identify the most appropriate data type. The Maths_test_score is used in
calculations.
Field name
Data type
family_name
first_name
Student_Id
Maths_test_score
joined_the_school
[5]
(c) Identify the two fields for which a format check would be the most appropriate validation
check. In each case describe how the format check would work.
1 ..............................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2015
0417/12/M/J/15
[Turn over
12
(d) The school secretary will use a screen input form to make it easier to enter data on the new
system.
Design a suitable screen input form to enter the details of one student using the fields given in
part (b) but leaving the field contents blank.
It should contain appropriate spacing for each field, as well as navigation aids and other
appropriate features of a screen input form.
[5]
15 One of the stages in systems analysis and design is called development and testing.
Describe the different testing strategies that can be used on a new system.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
© UCLES 2015
0417/12/M/J/15
13
16 An oil prospecting company wants to use an expert system to help it to decide where to drill for oil.
(a) Describe how such a system would work.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) Give two different uses of expert systems for diagnosis.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
© UCLES 2015
0417/12/M/J/15
14
BLANK PAGE
© UCLES 2015
0417/12/M/J/15
15
BLANK PAGE
© UCLES 2015
0417/12/M/J/15
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
© UCLES 2015
0417/12/M/J/15
Cambridge International Examinations
Cambridge International General Certificate of Secondary Education
* 8 5 7 2 5 5 6 4 5 3 *
INFORMATION AND COMMUNICATION TECHNOLOGY
Paper 1
0417/13
May/June 2015
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
This document consists of 15 printed pages and 1 blank page.
DC (AC) 101051/3
© UCLES 2015
[Turn over
2
1
This diagram shows a smart phone.
(a) Name two input devices shown on the phone diagram.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Name one storage device which would be available in the phone shown above.
.............................................................................................................................................. [1]
(c) Identify three ways the phone shown above could be used to contact a bank apart from
making a phone call to the bank.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2015
0417/13/M/J/15
3
2
Tick the most appropriate method of inputting data for the following uses.
MICR
✓
Use
Bar code
reader
✓
OMR
✓
Inputting exam answers from a multiple choice test paper
Inputting the account number from the bottom of a cheque
Inputting the ISBN from the back cover of a book
Inputting pencil marks from a school register
[4]
3
Explain what is meant by computer hardware and computer software, giving an example of each.
Hardware ..........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Software ...........................................................................................................................................
................................
0
You can add this document to your study collection(s)
Sign in Available only to authorized usersYou can add this document to your saved list
Sign in Available only to authorized users(For complaints, use another form )