0% found this document useful (0 votes)
10 views

Past Paper 1

The document is an examination paper for Cambridge IGCSE Computer Science, covering various topics including MAC addresses, data storage types, compression methods, input devices, programming languages, data transmission, and logic circuits. It contains questions requiring students to demonstrate their understanding of these concepts through various tasks, including conversions between number systems and explanations of technology operations. The paper is structured with clear instructions and marks allocated for each question.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Past Paper 1

The document is an examination paper for Cambridge IGCSE Computer Science, covering various topics including MAC addresses, data storage types, compression methods, input devices, programming languages, data transmission, and logic circuits. It contains questions requiring students to demonstrate their understanding of these concepts through various tasks, including conversions between number systems and explanations of technology operations. The paper is structured with clear instructions and marks allocated for each question.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

2

1 Greta has a computer that she uses for schoolwork and leisure.

(a) The computer has the Media Access Control (MAC) address:
Cambridge IGCSE™ 00:A0:C9:14:C8:29

(i) Tick (3) to show whether the MAC address is initially assigned to the computer by the
network, the manufacturer or the user.

Tick (3)

Network
* 3 0 8 8 7 7 7 2 2 4 *

COMPUTER SCIENCE 0478/13


Manufacturer
Paper 1 Theory May/June 2021
1 hour 45 minutes
User
You must answer on the question paper.
[1]
No additional materials are needed.
(ii) The values in the MAC address are hexadecimal values.
INSTRUCTIONS
● Answer all questions. Convert the three given hexadecimal values into 8-bit binary.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page. 14 ......................................................................................................................................
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid. A0 ......................................................................................................................................
● Do not write on any bar codes.
● Calculators must not be used in this paper. C9 ......................................................................................................................................
[3]

INFORMATION Working space


● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ]. ...........................................................................................................................................
● No marks will be awarded for using brand names of software packages or hardware.
...........................................................................................................................................

...........................................................................................................................................

(iii) Convert the two given hexadecimal values into denary.

29 ......................................................................................................................................

C8 ......................................................................................................................................
[2]

Working space

...........................................................................................................................................

...........................................................................................................................................
This document has 16 pages. Any blank pages are indicated.

...........................................................................................................................................
DC (DH/SG) 202681/5
© UCLES 2021 [Turn over
© UCLES 2021 0478/13/M/J/21
3 4

(b) Greta stores data on several off-line storage devices, including an external hard disk drive 2 Jolene displays videos on her website. She uses lossy compression to reduce the file size of the
(HDD), a USB flash memory drive and a compact disc (CD). videos.

(i) Identify the type of storage for each device. (a) Describe how lossy compression reduces the file size of the videos.

External HDD .................................................................................................................... ...................................................................................................................................................

USB flash memory drive ................................................................................................... ...................................................................................................................................................

CD ..................................................................................................................................... ...................................................................................................................................................
[3]
...................................................................................................................................................
(ii) Describe the operation of a HDD and how it stores data.
...................................................................................................................................................
...........................................................................................................................................
............................................................................................................................................. [3]
...........................................................................................................................................
(b) State two reasons why Jolene would use lossy rather than lossless compression for the
........................................................................................................................................... videos.

........................................................................................................................................... Reason 1 ..................................................................................................................................

........................................................................................................................................... ...................................................................................................................................................

........................................................................................................................................... Reason 2 ..................................................................................................................................

........................................................................................................................................... ...................................................................................................................................................
[2]
..................................................................................................................................... [4]

© UCLES 2021 0478/13/M/J/21 [Turn over © UCLES 2021 0478/13/M/J/21


5 6

3 An optical mouse is a type of input device that can be used to input data into a computer system. 4 Spencer finds out that his online music account has been accessed by an unauthorised person.

(a) Complete the paragraph about the operation of an optical mouse, using the most appropriate He believes his personal details for the account were obtained using phishing.
terms from the given list. Not all terms need to be used.
(a) Explain how the personal details could have been obtained using phishing.
• Ball
• Battery ...................................................................................................................................................
• LCD
• LED ...................................................................................................................................................
• Lens
• Magnifies ...................................................................................................................................................
• Matrix
• Microswitch ...................................................................................................................................................
• Photoelectric
• Photographic ...................................................................................................................................................
• Reduces
• USB ............................................................................................................................................. [3]

An optical mouse shines an ............................................ from the bottom of the mouse onto a (b) Give two other Internet security risks that could have been used to obtain the personal
details.
surface. Light bounces straight back from the surface into a ............................................ cell.
1 ................................................................................................................................................
This has a ............................................ that ............................................ the reflected light to
2 ................................................................................................................................................
allow detection of smaller movements. When a button on the mouse is clicked, a [2]

............................................ is pressed. A ............................................ connection is used to

carry the data to the computer.


[6]

(b) Identify two other input devices that can be used to enter data into a computer.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

© UCLES 2021 0478/13/M/J/21 [Turn over © UCLES 2021 0478/13/M/J/21


7 8

5 Six statements are given about programming languages. 6 Four 7-bit binary values are transmitted from one computer to another. A parity bit is added to
each binary value creating 8-bit binary values. All the binary values are transmitted and received
Tick (3) to show whether each statement applies to high-level language, assembly language or correctly.
machine code. Some statements may apply to more than one type of programming language.
(a) Identify whether each 8-bit binary value has been sent using odd or even parity by writing odd
High-level Assembly Machine or even in the type of parity column.
Statement language language code
(3) (3) (3) 8-bit binary value Type of parity
it requires a translator to be processed by a 01111100
computer
10010000
it is an example of low-level language
10011001
it uses mnemonics
00101001
it uses English-like statements [4]

it can be used to directly manipulate hardware in (b) The 8-bit binary value 10110001 is transmitted and received as 10110010
the computer
A parity check does not identify any errors in the binary value received.
it is portable
State why the parity check does not identify any errors.
[6]
...................................................................................................................................................

............................................................................................................................................. [1]

(c) The data is sent using serial duplex data transmission.

(i) Describe how data is sent using serial duplex data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) State one drawback of using serial data transmission, rather than parallel data
transmission.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2021 0478/13/M/J/21 [Turn over © UCLES 2021 0478/13/M/J/21


9 10

7 Marco uses his computer for work. The data he uses on a daily basis is valuable to his business. 8 Consider the following logic circuit:

Marco is concerned about his data being accidentally damaged. Human error, such as incorrectly A
removing external storage devices, is one way that the data can be accidentally damaged.

(a) Identify two other ways that data can be accidentally damaged.

1 ................................................................................................................................................

2 ................................................................................................................................................ X
[2] B
(b) Removing storage devices correctly from the computer can help prevent data being
accidentally damaged.

Give two other ways that accidental damage to data can be prevented.

1 ................................................................................................................................................
C
...................................................................................................................................................
(a) Two NOT gates are used in the given logic circuit.
2 ................................................................................................................................................
Identify three other logic gates that are used in the given logic circuit.
...................................................................................................................................................
[2] 1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2021 0478/13/M/J/21 [Turn over © UCLES 2021 0478/13/M/J/21


11 12

(b) Consider the completed truth table for the given logic circuit. 9 An underground car park has a system that checks the height of vehicles. A vehicle can be no
higher than 1.8 metres to enter the car park.
Row Working space
A B C X
number The system also counts the number of vehicles that have entered the car park, so that it can
display how many parking spaces are still available.
1 0 0 0 0
Each parking space has a red and a green light above it. If a car is parked in the parking space
2 0 0 1 1
only the red light is on, otherwise only the green light is on.
3 0 1 0 0
Sensors and a microprocessor are used to control the system.
4 0 1 1 0
(a) Complete the table to identify a suitable sensor for each part of the system.
5 1 0 0 1

6 1 0 1 1 Task Sensor

7 1 1 0 0 check if a vehicle is too high

8 1 1 1 1 count the vehicles entering the car park

There are four errors in the truth table in the output (X) column. check if a vehicle is parked in a parking space

Identify the four incorrect outputs. [3]

Write the row number to identify each incorrect output. (b) Describe how the sensor and the microprocessor are used to display the red or green light
above the parking space.
Row .......................
...................................................................................................................................................
Row .......................
...................................................................................................................................................
Row .......................
...................................................................................................................................................
Row .......................
[4] ...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2021 0478/13/M/J/21 [Turn over © UCLES 2021 0478/13/M/J/21


13 14

10 Several components are involved in processing an instruction in a Von Neumann model for a BLANK PAGE
computer system.

Three of these components are the arithmetic logic unit (ALU), control unit (CU) and random
access memory (RAM).

(a) Six statements are given about the components.

Tick (3) to show if each statement applies to the ALU, CU or the RAM. Some statements may
apply to more than one component.

ALU CU RAM
Statement
(3) (3) (3)
stores data and instructions before they enter the central
processing unit (CPU)

contains a register called the accumulator

manages the transmission of data and instructions to the


correct components

contained within the CPU

uses the data bus to send data into or out of the CPU

carries out calculations on data

[6]

(b) The accumulator is a register that is part of the Von Neumann model.

Give two other registers that are part of the Von Neumann model.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

© UCLES 2021 0478/13/M/J/21 © UCLES 2021 0478/13/M/J/21


15 16

BLANK PAGE BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 0478/13/M/J/21 © UCLES 2021 0478/13/M/J/21


2

1 A denary value can be converted into hexadecimal and binary.

(a) Complete the table to show the hexadecimal and 8-bit binary values of the given denary
Cambridge IGCSE™ values.

Denary Hexadecimal 8-bit binary

49

123
* 1 8 7 5 9 9 1 1 3 6 *

COMPUTER SCIENCE 0478/12


200
Paper 1 Theory May/June 2021
1 hour 45 minutes [6]
You must answer on the question paper. Working space
No additional materials are needed.
...................................................................................................................................................

INSTRUCTIONS ...................................................................................................................................................
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs. ...................................................................................................................................................
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided. ...................................................................................................................................................
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes. ...................................................................................................................................................
● Calculators must not be used in this paper.
(b) Give two benefits, to users, of converting binary values to hexadecimal.

INFORMATION Benefit 1 ....................................................................................................................................


● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ]. ...................................................................................................................................................
● No marks will be awarded for using brand names of software packages or hardware.
Benefit 2 ....................................................................................................................................

...................................................................................................................................................
[2]

(c) Hexadecimal is used to represent Hypertext Markup Language (HTML) colour codes in
computer science.

Identify three other ways that hexadecimal is used in computer science.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
This document has 12 pages. Any blank pages are indicated. [3]

DC (DH/SG) 202677/4
© UCLES 2021 [Turn over
© UCLES 2021 0478/12/M/J/21
3 4

2 Data storage can be magnetic, solid state or optical. 3 Consider the logic statement:

(a) Six statements are given about data storage. X = ((((NOT A AND B) OR C) AND B) NOR (B OR C))

Tick (3) to show if the statement applies to magnetic, solid state or optical storage. Some (a) Draw a logic circuit to represent the given logic statement.
statements may apply to more than one type of storage.
Do not attempt to simplify the statement. All logic gates must have a maximum of two inputs.
Magnetic Solid state Optical
Statement
(3) (3) (3)
no moving parts are used to store data

pits and lands are used to store data


A
data is stored on platters

flash memory is used to store data

parts are rotated to store data

data can be stored permanently


[6]

(b) (i) Give one example of magnetic storage. B X

..................................................................................................................................... [1]

(ii) Give one example of optical storage.

..................................................................................................................................... [1]

(iii) Identify which type of storage would be the most suitable for use in a web server and
justify your choice.

Type of storage .................................................................................................................. C


Justification ........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]
[3]

(c) Describe the operation of USB flash memory and how it stores data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2021 0478/12/M/J/21 [Turn over © UCLES 2021 0478/12/M/J/21


5 6

(b) Consider the completed truth table for the given logic statement. 4 Three types of Internet security risk are virus, spyware and denial of service (DoS) attack.

Row Working space (a) Six statements are given about Internet security risks.
A B C X
number
Tick (3) to show whether the statement applies to virus, spyware or denial of service. Some
1 0 0 0 1 statements may apply to more than one Internet security risk.
2 0 0 1 1
Denial of
3 0 1 0 1 Statement Virus Spyware service
(3) (3) (3)
4 0 1 1 0
captures all data entered using a keyboard
5 1 0 0 1
can be installed onto a web server
6 1 0 1 0
prevents access to a website
7 1 1 0 1
is malicious code on a computer
8 1 1 1 1
is self-replicating

There are four errors in the truth table in the output (X) column. damages the files on a user’s hard drive
[6]
Identify the four incorrect outputs.
(b) Identify three other types of Internet security risks.
Write the row number to identify each incorrect output.
1 ................................................................................................................................................
Row .......................
2 ................................................................................................................................................
Row .......................
3 ................................................................................................................................................
Row .......................
[3]
Row .......................
(c) Some Internet security risks can maliciously damage data. Data can also be damaged
[4]
accidentally.

State three ways that data could be accidentally damaged.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2021 0478/12/M/J/21 [Turn over © UCLES 2021 0478/12/M/J/21


7 8

5 A security light system is used by a factory. The light only comes on when it is dark and when 6 Cookies can be used to store a user’s personal data and online browsing habits.
movement is detected. The light will stay on for 1 minute before switching off.
(a) A cookie could be used to automatically enter a user’s payment details when the user makes
Sensors and a microprocessor are used to control the security light system. a purchase online.

(a) Identify two sensors that would be used in the security light system. Describe how cookies can be used to store and automatically enter a user’s payment details.

Sensor 1 ................................................................................................................................... ...................................................................................................................................................

Sensor 2 ................................................................................................................................... ...................................................................................................................................................


[2]
...................................................................................................................................................
(b) Describe how the sensors and the microprocessor control the security light system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
...................................................................................................................................................
(b) Explain why a user may be concerned about their personal data and online browsing habits
................................................................................................................................................... being stored in cookies.

................................................................................................................................................... ...................................................................................................................................................

................................................................................................................................................... ...................................................................................................................................................

................................................................................................................................................... ...................................................................................................................................................

................................................................................................................................................... ...................................................................................................................................................

................................................................................................................................................... ...................................................................................................................................................

................................................................................................................................................... ...................................................................................................................................................

................................................................................................................................................... ...................................................................................................................................................

................................................................................................................................................... ............................................................................................................................................. [4]

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [8]

© UCLES 2021 0478/12/M/J/21 [Turn over © UCLES 2021 0478/12/M/J/21


9 10

7 Jolene uses HTML to create a website. She separates the HTML into structure and presentation. BLANK PAGE

(a) (i) Give one example of HTML structure.

..................................................................................................................................... [1]

(ii) Give two examples of HTML presentation.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(b) Explain why Jolene separates the HTML into structure and presentation.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

8 A keyboard is a type of input device that can be used to enter data into a computer.

Complete the paragraph that describes one method of operation for a keyboard, using the most
appropriate terms from the given list. Not all terms in the list need to be used.

• Binary
• Breaks
• Calculated
• Character
• Circuit
• Current
• Information
• Network
• Press
• Processor
• Signal
• Switch

A keyboard has a key matrix underneath the keys. When a key is pressed, it presses a

............................................. that completes a ............................................. . This allows

............................................. to flow. The location of the key pressed is

............................................. . The location of the key pressed is compared to a

............................................. map to find the ............................................. value for the key that

has been pressed.


[6]

© UCLES 2021 0478/12/M/J/21 © UCLES 2021 0478/12/M/J/21


11 12

BLANK PAGE BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 0478/12/M/J/21 © UCLES 2021 0478/12/M/J/21

You might also like