CS Past Paper Book-pages-1
CS Past Paper Book-pages-1
SCI
IGCSE
23-24
PYQ
YEAR 11
Cambridge IGCSE™
* 1 8 6 2 2 6 2 8 5 3 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (EF) 313505/3
© UCLES 2023 [Turn over
2
A Software that activates a webcam and transmits the video to a third party
that outputs it live on a website.
B Software that detects when a password is being entered and then emails
the password to a third party.
C Software that records all data entered into a computer, analyses this data
to find email addresses and passwords, then posts these to a website.
D Software that records all key presses and transmits these to a third party.
[1]
(b) Complete the table by identifying and describing two other examples of malware.
Malware Description
...........................................................................................................
...........................................................................................................
......................................
1 ...........................................................................................................
......................................
...........................................................................................................
...........................................................................................................
...........................................................................................................
...........................................................................................................
......................................
2 ...........................................................................................................
......................................
...........................................................................................................
...........................................................................................................
[6]
Identify two similarities and one difference between proxy-servers and firewalls.
Similarity 1 ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Similarity 2 ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Difference .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
2 A programmer has designed a three-dimensional (3D) interactive computer game. They are going
to develop a program for the game. The program needs to run efficiently, but it must also be
developed as soon as possible.
(a) Tick (✓) one box to identify whether the programmer should use a high-level language or a
low-level language to develop the program.
High-level language
Low-level language
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) If the programmer chooses a high-level language, they can use a compiler or an interpreter to
translate the high-level language into a low-level language.
Compiler ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Interpreter .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...................................................................................................................
pixel ...................................................................................................................
...................................................................................................................
...................................................................................................................
resolution ...................................................................................................................
...................................................................................................................
[2]
(b) One of the images has a resolution of 1000 × 1000 and a colour depth of 2 bytes.
Calculate the file size of the image. Give your answer in bytes.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(c) The photographer decides to purchase a solid-state storage device to back up their images.
Some of the terms in the list will not be used. You should only use a term once.
........................................................... .
Gates are used to control the flow of the ........................................................... through the
...................................................................................................................................................
............................................................................................................................................. [1]
The structure of a packet of data has three elements. One element is the packet header.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(b) Computer A needs to be directly connected to a router that is located in a different room.
(i) Tick (✓) one box to identify whether serial data transmission or parallel data transmission
is more suitable for this connection.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(i) The bytes need to be sent using an even parity byte check.
Parity
bit
Byte A 1 1 0 0 0 1 1
Byte B 0 0 0 0 0 0 0
[2]
(ii) A parity block check can be used instead of a parity byte check.
Explain how a parity block check might detect an error in transmission that would not be
detected by a parity byte check.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(iii) The data was sent using an even parity block check. One of the bits has been transmitted
incorrectly.
Parity
Bit 1 Bit 2 Bit 3 Bit 4 Bit 5 Bit 6 Bit 7
bit
Byte 0 1 1 1 0 1 0 0 0
Byte 1 0 0 1 0 0 1 0 0
Byte 2 1 0 1 1 0 0 0 1
Byte 3 1 1 0 0 1 1 1 1
Byte 4 1 0 1 0 0 0 1 0
Byte 5 0 0 0 0 0 0 0 0
Byte 6 0 1 1 1 1 0 0 0
Parity
0 1 1 0 1 0 1 0
byte
Identify the bit number and the byte number of the incorrect bit.
(d) The website allows the user to set up an account to log on and purchase items. The website
is accessed and displayed using a web browser.
(i) Two functions of the web browser are to render hypertext markup language (HTML) to
display web pages and to store cookies.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(ii) Identify two ways that cookies can be used to enhance the user’s experience of this
website.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
One of its robots is designed to make a specific movement depending on a binary value.
(a) The table gives some of the movements for the robot.
Complete the table by writing the missing binary, denary or hexadecimal value for each
movement.
[4]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
The robot will move forward continuously until it detects an object that is less than or equal to
10 cm in front of it.
If an object is less than or equal to 10 cm in front of it, the robot turns 90 degrees right. It then
tries to move forward again.
Explain how the sensor and the microprocessor are used to automate this robot.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [7]
(d) The robot needs to find its way through different puzzles. Each puzzle has a series of paths
that the robot needs to follow to find its way to the end of the puzzle. The puzzle contains
dead ends and obstacles, so the robot needs to decide which way to go.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (EF) 313965/2
© UCLES 2023 [Turn over
2
(a) Tick (3) one box to show which statement about the binary number system is correct.
A It is a base 1 system
B It is a base 2 system
C It is a base 10 system
D It is a base 16 system
[1]
50 ..............................................................................................................................................
102 ............................................................................................................................................
221 ............................................................................................................................................
[3]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Register:
[2]
00110011
+01100001
[3]
(e) Two binary numbers are added by a computer and an overflow error occurs.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
2 A student has a sound file that is too large to be stored on their external secondary storage device.
The student compresses the sound file to make the file size smaller.
The compression method used reduces the sample rate and the sample resolution of the sound
file.
(a) State what is meant by the sample rate and sample resolution.
...................................................................................................................................................
...................................................................................................................................................
[2]
(b) Identify which type of compression has been used to compress the sound file.
...................................................................................................................................................
............................................................................................................................................. [1]
(c) The student sends the sound file to a friend. The file is transmitted across a network that uses
packet switching.
(i) Identify two pieces of data that would be included in the header of each packet.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
hard disk drive (HDD) random access memory (RAM) read only memory (ROM)
[3]
(b) Tick (3) one box to show which statement about secondary storage is correct.
D It is volatile.
[1]
Some of the terms in the list will not be used. You should only use a term once.
the ........................................................................ .
[4]
5 A farm has an automated drinking system for its animals. The drinking system has a water bowl
that contains the water. When the water bowl is empty, it is automatically refilled.
............................................................................................................................................. [1]
(b) Describe how the sensor and the microprocessor are used to automatically refill the water
bowl.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(a) (i) Identify the component in the computer that is needed to access a network.
..................................................................................................................................... [1]
(ii) Identify the type of address that is allocated to the component by the manufacturer,
which is used to uniquely identify the device.
..................................................................................................................................... [1]
(b) A dynamic internet protocol (IP) address is allocated to the computer when it is connected to
the network.
(i) Identify the device on the network that can connect multiple devices and automatically
assign them an IP address.
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
7 A programmer uses a low-level language to write a computer program for a vending machine.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Give two reasons why the programmer would choose to write the computer program in a
low-level language instead of a high-level language.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2023 0478/11/M/J/23 [Turn over
8
8 A manager at a company is concerned about a brute-force attack on its employee user accounts.
(a) Describe how a brute-force attack can be used to gain access to the employee user accounts.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) One possible aim for carrying out a brute-force attack is to install malware onto the company
network.
(i) State two other aims for carrying out a brute-force attack to gain access to the employee
user accounts.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(c) Give two security solutions that could be used to help prevent a brute-force attack being
successful.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Give two advantages to company employees of using robots to manufacture large pieces of
furniture.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(c) Give one disadvantage to the company’s owners of using robots to manufacture large pieces
of furniture.
...................................................................................................................................................
............................................................................................................................................. [1]
10 A student uses the internet for their schoolwork to research what is meant by pharming.
...................................................................................................................................................
............................................................................................................................................. [1]
[4]
(c) The student uses a web browser to access data on the internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(e) A student visits a website that uses session cookies, instead of persistent cookies.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (EF) 313966/2
© UCLES 2023 [Turn over
2
10010011 ..................................................................................................................................
00001101 ..................................................................................................................................
[4]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
0 1 1 1 1 0 1 0
(i) Complete the binary register to show its contents after this logical right shift.
[1]
(ii) State one effect this logical shift has on the binary number.
...........................................................................................................................................
..................................................................................................................................... [1]
(c) Give two reasons why a programmer may use hexadecimal to represent binary numbers.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 When keys are pressed on a keyboard, the text is converted to binary to be processed by the
computer.
(a) Describe how the text is converted to binary to be processed by the computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Text that is input into a computer can be stored in a text file.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(iii) Give two reasons why the text file may have been compressed.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
The student needs to transmit the photographs to their computer. They could use serial data
transmission or parallel data transmission to transmit the photographs.
(a) (i) Describe how the photographs would be transmitted using serial data transmission.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Give two benefits of transmitting the photographs using serial data transmission.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(iii) State one benefit of the student using parallel data transmission instead of serial data
transmission.
...........................................................................................................................................
..................................................................................................................................... [1]
(b) The photographs are also transmitted across a network to cloud storage. A device on the
network forwards the data towards its correct destination.
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(iii) Give one disadvantage of storing the photographs in cloud storage instead of storing
them locally.
...........................................................................................................................................
..................................................................................................................................... [1]
© UCLES 2023 0478/12/M/J/23 [Turn over
6
(a) Tick (3) one box to show which statement is correct about writing computer programs in a
high-level language.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(c) The programmer uses an integrated development environment (IDE) to create the computer
program.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
Some of the terms in the list will not be used. Some terms may be used more than once.
secondary storage.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
[6]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(c) Give two security solutions that can be used to help prevent a DDoS attack being successful.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(a) Tick (3) one box to show which device would assign the IPv4 address to the computer.
C Router
D Web server
[1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
10 A user has both system software and application software installed on their computer.
(a) Describe the difference between system software and application software.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) State which component in the computer would store both types of software when the power is
turned off.
............................................................................................................................................. [1]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CJ) 313967/3
© UCLES 2023 [Turn over
2
............................................................................................................................................. [1]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(c) A logical left shift of three places is performed on the binary number.
(i) Give the 8-bit binary number that would be stored after this logical left shift.
..................................................................................................................................... [1]
(ii) Tick (3) one box to show which statement is true about the impact the logical left binary
shift would have on the binary number.
(d) Add the two 8-bit binary numbers 11101110 and 00110001 using binary addition.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Calculate the least number of bits that can be used to store the denary number 301.
............................................................................................................................................. [1]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Calculate the least number of bits that can be used to store the hexadecimal number A4D.
............................................................................................................................................. [1]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 A library has a self-checkout system that allows customers to register books that they want to
borrow.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) The CPU is replaced with one that has four cores.
Explain the effect this has on the performance of the self-checkout system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Identify one bus that can be found in the CPU and explain its purpose in the
fetch–decode–execute cycle.
Bus ....................................................................................................................................
Purpose .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(d) The self-checkout system allows the user to input their library membership number.
Give two appropriate input devices that would allow the user to do this.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(e) The self-checkout system uses a monitor to display information about the book.
Users who are blind also need to use the self-checkout system.
Give an appropriate output device that would allow a blind user to be given this information.
............................................................................................................................................. [1]
Circle two types of primary storage that would be used in the system.
read only memory (ROM) universal serial bus (USB) flash memory drive
[2]
(g) The self-checkout system is linked to a stock control system that is updated every time a
book is borrowed from the library.
Explain the role of the microprocessor in this system and how it is used to update the stock
when a book is borrowed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Term Definition
.............................................................................................
.............................................................................................
router
.............................................................................................
.............................................................................................
.............................................................................................
.............................................................................................
network interface card (NIC)
.............................................................................................
.............................................................................................
(a) Tick (3) one box to show which statement is a benefit of writing a program in a high-level
language, instead of a low-level language.
(b) Translators are used to translate the high-level language so that it can be processed by the
computer.
..................................................................................................................................... [1]
(ii) One translator converts and executes the code line by line.
..................................................................................................................................... [1]
(iii) One translator creates an error report displaying all the errors in the code before it can
be executed.
..................................................................................................................................... [1]
..................................................................................................................................... [1]
5 Complete and annotate the diagram to demonstrate how packet switching is used to transmit data
across a network, including the use of routers, from Device A to Device B.
Device A Device B
[4]
6 A student is writing a help guide about how to recognise and avoid the cyber-security threat of
pharming.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(b) The student also wants to include information in the help guide about the use of social
engineering as a cyber-security threat.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) The student includes information about the security solution of access levels.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
7 The rule base and the inference engine are two components of an expert system.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Some of the terms in the list will not be used. You should only use a term once.
When the attacker wants the DDoS to take place, repeated requests are simultaneously sent from
this hardware.
[5]
9 A device can be given an internet protocol (IP) address. This can be an IPv4 or IPv6.
...................................................................................................................................................
............................................................................................................................................. [1]
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(i) Identify the system that stores a database of uniform resource locators (URLs) and their
corresponding IP addresses.
..................................................................................................................................... [1]
(ii) Identify the software that sends a request to the IP address to obtain the web page data.
..................................................................................................................................... [1]
10 A computer has pages A, B and C that are stored in RAM. Page D needs to be sent to the RAM
but the RAM is full.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
(a) State the name of the software that can do these tasks.
............................................................................................................................................. [1]
(b) Give one task that the software allows the user to do to manage files.
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
............................................................................................................................................. [1]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (LK) 314031/3
© UCLES 2023 [Turn over
2
1 A student uses a computer and several hardware devices to complete his schoolwork.
Tick (3) one box to show which type of device the keyboard is.
A input
B memory
C output
D storage
[1]
Tick (3) one box to show which type of device the printer is.
A input
B memory
C output
D storage
[1]
(c) A component in the CPU sends signals to manage the fetch-decode-execute cycle.
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(e) The CPU contains registers including the memory data register (MDR).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
2 A car park has a payment machine that allows a customer to pay for their parking.
The cost of parking is displayed as a denary number on a screen on the payment machine.
(a) Give the parking cost that would be displayed on the payment machine when the registers
store:
• register 1: 00010001
• register 2: 01000110
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Give the 8-bit binary numbers that are stored in the registers to display the parking cost.
Register 1 .................................................................................................................................
Register 2 .................................................................................................................................
[2]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(c) The payment machine gives the customer a ticket when they have paid their parking cost.
Each ticket has a 4-digit hexadecimal ticket number that is stored as binary.
Give the hexadecimal ticket number that would be displayed on this customer’s ticket.
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(d) Explain why data input into the payment machine needs to be converted to binary.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(e) When a customer is leaving the car park they arrive at a barrier. The customer needs to insert
their ticket into a system at the barrier. This system reads the ticket number then checks
whether the parking cost has been paid for the car. The barrier is raised if it has been paid.
Describe the role of the microprocessor in the system and how it checks whether the parking
cost has been paid.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Complete the table by writing the correct term for each description.
Term Description
(a) The data is transmitted one bit at a time down a single wire. The computer can transmit data
to the printer and the printer can transmit data to the computer, using the same connection.
Circle the two data transmission methods that will transmit data in this way.
(b) An odd parity check is used to detect errors in the data transmission.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(c) Another error detection method sends the data from the computer to the printer, then a copy
of the data received is sent back from the printer to the computer. The two sets of data are
compared to see if they match.
............................................................................................................................................. [1]
5 A musician is recording herself playing the music for a song on the piano.
(a) Explain how the analogue sound is recorded and converted to digital.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
(b) State two ways that the accuracy of the recording could be increased.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(c) The musician compresses the sound file using lossless compression instead of lossy
compression.
Explain why the musician would choose to use lossless compression instead of lossy
compression.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(d) The musician types the words for the song into a document.
Two character sets that can be used when converting text to digital are the American standard
code for information interchange (ASCII) and Unicode.
Explain the differences between the ASCII character set and the Unicode character set.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
[4]
© UCLES 2023 0478/11/O/N/23
9
Some of the terms in the list will not be used. You should only use a term once.
Data is broken down into packets. A data packet has a packet .......................................................
Each packet could take a different path from the sender to the receiver; this is controlled by
...................................................... .
Packets may arrive out of order. Once the ...................................................... packet has arrived,
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2023 0478/11/O/N/23 [Turn over
10
Magnetic ...................................................................................................................................
Solid-state .................................................................................................................................
Optical ......................................................................................................................................
[3]
(a) State the name of the type of software that manages interrupts.
............................................................................................................................................. [1]
(b) Describe how interrupts are used when a key is pressed on a keyboard.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (LK) 314033/2
© UCLES 2023 [Turn over
2
(a) Tick (3) one box to show which cyber security threat is not a type of malware.
A Phishing
B Ransomware
C Virus
D Worm
[1]
(b) Identify one other example of malware than those given in part 1(a).
............................................................................................................................................. [1]
(c) Identify the type of software that is used to find and remove malware from a computer.
............................................................................................................................................. [1]
1 1 1 0 0 0 1 1
(a) Give the denary number for the binary number stored in the register.
............................................................................................................................................. [1]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(b) Give the hexadecimal number for the binary number stored in the register.
............................................................................................................................................. [2]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(c) A logical left shift of two places is performed on the binary number stored in the register.
Complete the binary register to show its contents after this logical left shift.
[1]
(d) The negative denary number −99 needs to be stored in the register.
Complete the register to show the binary number that would be stored, using two’s
complement. Show all your working.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Register:
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
3 A user’s computer has a central processing unit (CPU) that has a clock speed of 2 GHz.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Explain the effect this change will have on the performance of the CPU.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) The CPU has a list of all the machine code commands it can process.
............................................................................................................................................. [1]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
freezer laptop
5 A band is recording their new song. They need to consider the sample rate and sample resolution
of their recording.
(a) Give one benefit of using a higher sample rate to record the song.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) Give one drawback of using a higher sample rate to record the song.
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(d) The band wants to compress the sound file, but they do not want any data to be permanently
removed.
............................................................................................................................................. [1]
Complete the table by identifying which data transmission methods are described.
[4]
7 A train station has a ticket inspector who checks each customer’s ticket before they are allowed to
get on the train.
The train station wants a system that will allow the tickets to be automatically checked.
(a) Identify two suitable input devices that can be used to automatically read the tickets.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) The train driver pushes a button to close the train door when all passengers have boarded
the train. The train door will only close when there are no passengers in the doorway.
The system to check there are no passengers in the doorway uses a sensor and a
microprocessor.
Explain how the sensor and the microprocessor are used to check whether the train door can
be closed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
8 (a) Draw and annotate a diagram that demonstrates the cyber security threat of data interception.
[4]
(b) Identify one security solution that will help keep data safe from data interception and state
why it will help keep the data safe.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
© UCLES 2023 0478/12/O/N/23
9
Term Description
.................................................. the collective name for all the web pages available
a small text file, stored by the web browser, that can store
..................................................
a user’s personal data
...........................................................................................
...........................................................................................
...........................................................................................
...........................................................................................
[6]
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) Explain one disadvantage to the company owner of using an automated system in
manufacturing.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Identify the process that uses a digital ledger to track the use of digital currency.
............................................................................................................................................. [1]
(i) Tick (3) one box to show which is an example of primary storage.
..................................................................................................................................... [1]
Some of the terms in the list will not be used. Some terms may be used more than once.
...................................................................... to the
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (LK) 314035/3
© UCLES 2023 [Turn over
2
(a) Give two examples of an input device that would be built into a mobile telephone.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Give one example of an output device that would be built into a mobile telephone.
............................................................................................................................................. [1]
(c) The data storage in the mobile telephone can be measured using different units of
measurement.
..................................................................................................................................... [1]
..................................................................................................................................... [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
2 Humans use a denary number system and computers use a binary number system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
14 ..............................................................................................................................................
59 ..............................................................................................................................................
234 ............................................................................................................................................
[3]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
9 ................................................................................................................................................
26 ..............................................................................................................................................
65 ..............................................................................................................................................
[3]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(d) Convert the positive denary number 123 to 8-bit binary using two’s complement.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(e) Add the binary values 00110011 and 01111000 using binary addition.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(a) Circle three components that are built into the CPU.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) The CPU has a component that regulates the number of fetch–decode–execute cycles the
CPU can perform in a second.
............................................................................................................................................. [1]
(d) The CPU has a component that carries out all calculations and logical operations.
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) The employee wants his payment details to be automatically filled in when he buys products
using the internet.
Identify the function of a web browser that could be used for this purpose.
............................................................................................................................................. [1]
(c) The employee wants to be able to quickly access websites that he regularly uses.
Identify the function of a web browser that could be used for this purpose.
............................................................................................................................................. [1]
(d) The web browser uses the secure socket layer (SSL) protocol to transmit personal data
securely over the internet.
State how the SSL protocol secures the data for transmission.
...................................................................................................................................................
............................................................................................................................................. [1]
(a) Give one reason an error may occur when data is transmitted.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) Some error detection methods use a calculated value to check for errors.
Tick (3) one box to show which error detection method does not use a calculated value to
check for errors.
A Check digit
B Checksum
C Echo check
D Parity check
[1]
(c) An automatic repeat request (ARQ) can be used to make sure that data is received free of
errors. It can use a positive or negative acknowledgement method to do this.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
(a) Tick (3) one box to show which is not a characteristic of cloud storage.
(b) Explain two advantages for the owners of the company of storing its data in cloud storage.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(c) Explain one disadvantage to employees of the company storing data in the cloud.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
7 A photographer takes an image with a digital camera. The photographer sets the resolution and
colour depth for the image.
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
............................................................................................................................................. [1]
(c) Give one benefit of increasing the colour depth of the image.
...................................................................................................................................................
............................................................................................................................................. [1]
(d) The photographer compresses the image using a method that permanently reduces the
colour depth and resolution of the image.
............................................................................................................................................. [1]
(e) One benefit for compressing the image is to reduce the storage space it uses.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
[4]
Complete the table by writing the type of secondary storage that applies to each statement.
Some types of secondary storage may apply to more than one statement.
(b) Explain two differences between primary storage and secondary storage.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(a) Complete the description about the operation of the expert system.
Use the terms from the list. Some of the terms in the list will not be used.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (DE) 327909/3
© UCLES 2024 [Turn over
2
(a) Tick (✓) one box to show the reason why computers use binary to represent data.
B Computers are made of switches and gates that can only be on or off.
C Binary does not need to be converted into other forms of data to be displayed.
The American standard code for information interchange (ASCII) denary number for the
character ‘N’ is 78.
(i) Tick (✓) one box to identify the ASCII denary number for the character ‘Q’.
A 81
B 80
C 79
D 77
[1]
(ii) Give the binary number for the ASCII denary number for ‘N’.
..................................................................................................................................... [1]
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(iii) Explain how the word ‘RED’ is represented using a character set.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
© UCLES 2024 0478/12/F/M/24
3
(i) Explain why recording sound with a higher sampling resolution creates a more accurate
recording.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Give one other way that the accuracy of a sound recording can be improved.
...........................................................................................................................................
..................................................................................................................................... [1]
(a) The table contains five statements about the role of registers in the fetch–decode–execute
cycle of a CPU.
Letter Statement
A PC stores the address of the next instruction to be accessed
B MAR stores the instructions of the program that is running
C MDR stores the data passed to it from the PC
D ACC stores the result of each calculation
E CIR stores the instruction currently being executed
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(b) The computer has a single core 3.5 GHz processor and an 8 kB cache.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Read only memory (ROM) is another example of primary storage. ROM often stores the
start-up instructions for a computer.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
..................................................................................................................................... [1]
(a) Complete the table by writing each missing OS function name and description.
……………………………………………………………………………
……………………………………………………………………………
managing memory
……………………………………………………………………………
……………………………………………………………………………
……………………................…
allows application software to run on the computer
……………………................…
……………………………………………………………………………
……………………………………………………………………………
managing peripherals
……………………………………………………………………………
……………………………………………………………………………
[3]
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Identify one input device and one example of an interrupt that it can generate.
Interrupt .............................................................................................................................
[1]
Explain how the processor manages the current program and the interrupt.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
4 A student enters a uniform resource locator (URL) into their web browser.
Draw and annotate a diagram to show the process from the user entering the URL to the web
browser displaying the web page.
[5]
transaction-chains virtually
electronically.
These are decentralised databases where each transaction is stored as a new set of data with
a ........................................................... and is linked to the previous set of data. This means that
transactions cannot be altered, only new transactions added, which allows the location of the data
to be ........................................................... .
[4]
6 A self-driving tractor sows seeds and harvests crops for a farmer. The self-driving tractor moves
automatically through the field, turning at each end and stopping when it has finished.
(a) One reason the self-driving tractor is a robot is because it has a mechanical structure that
includes wheels, an engine, and a framework.
Give one other reason why the self-driving tractor is an example of a robot.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) If a person is detected within 3 metres whilst the tractor is moving, the self-driving tractor
must stop.
(i) Explain how an infra-red sensor, microprocessor and actuator can be used to stop the
self-driving tractor if a person is detected within 3 metres.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
(ii) Identify one other sensor that the self-driving tractor might use and how it will use the
sensor.
Sensor ...............................................................................................................................
Use ....................................................................................................................................
...........................................................................................................................................
[2]
(c) Explain the drawbacks of a farmer using a self-driving tractor to sow seeds and harvest crops.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(d) The self-driving tractor has an in-built expert system that the farmer can use to solve any
errors with the tractor.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(e) At the end of each day the self-driving tractor transmits the data it has collected to the farmer’s
computer in their house.
(i) Describe the role of the self-driving tractor and the farmer’s computer in the echo check.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
The table shows 7 bytes that are transmitted using odd parity. The parity bit has been
completed for each byte.
parity
bit 7 bit 6 bit 5 bit 4 bit 3 bit 2 bit 1
bit
byte 1 1 1 0 0 1 1 1 0
byte 2 1 0 0 0 0 1 1 0
byte 3 0 1 0 0 0 0 0 0
byte 4 0 1 0 0 1 1 1 1
byte 5 1 0 0 0 0 0 0 0
byte 6 0 1 1 1 1 1 1 1
byte 7 1 1 0 0 1 1 0 1
parity
byte
[3]
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
..................................................................................................................................... [1]
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(ii) Give one benefit of using hexadecimal instead of binary to represent data.
...........................................................................................................................................
..................................................................................................................................... [1]
(b) Two’s complement can be used to represent positive and negative binary integers.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Convert the denary number 45 into an 8-bit two’s complement integer.
...........................................................................................................................................
..................................................................................................................................... [1]
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
State the mathematical effect of a right shift of four places on a positive binary integer.
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CJ) 329154/3
© UCLES 2024 [Turn over
2
(a) Identify two input devices that could be built into the portable tablet computer.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Identify one output device that could be built into the portable tablet computer.
............................................................................................................................................. [1]
(c) Identify one type of storage device that could be built into the portable tablet computer.
............................................................................................................................................. [1]
(a) Tick (3) one box to show which statement about the hexadecimal number system is incorrect.
C It is a base 10 system.
20 ..............................................................................................................................................
32 ..............................................................................................................................................
165 ............................................................................................................................................
[3]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(a) Give the 8-bit binary number that will be stored after the shift has taken place.
............................................................................................................................................. [1]
(b) Tick (3) one box to show which statement about a logical left shift of two places is correct.
Convert the two’s complement integer 10100011 to denary. Show all your working.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
............................................................................................................................................. [1]
4 Data packets are transmitted across a network from one computer to another computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Packet switching is used to transmit the data packets across the network.
Identify the device that controls which path is taken by each data packet.
............................................................................................................................................. [1]
(c) Serial data transmission is used to transmit the data packets across the network.
Explain why serial data transmission is used to transmit the data packets.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
5 A computer uses both random access memory (RAM) and secondary storage.
...................................................................................................................................................
............................................................................................................................................. [1]
read only memory (ROM) secure digital (SD) card compact disk (CD)
Blu-ray disk universal serial bus (USB) drive solid-state drive (SSD)
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(d) The computer processes instructions using the fetch–decode–execute (FDE) cycle.
Draw and annotate a diagram to show the process of the fetch stage of the FDE cycle.
[4]
...................................................................................................................................................
............................................................................................................................................. [1]
............................................................................................................................................. [1]
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
Some of the terms in the list will not be used. You should only use a term once.
.............................................................. . [4]
BLANK PAGE
...................................................................................................................................................
............................................................................................................................................. [1]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(c) The robot plants seeds and stops when it reaches a fence. It then turns and continues planting
seeds. The robot uses sensors and a microprocessor to know when it reaches a fence.
Explain how the robot uses sensors and a microprocessor to know it has reached a fence.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(d) Give two advantages of the farmer using an automated robot to plant seeds.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(e) Give two disadvantages of the farmer using an automated robot to plant seeds.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
9 A company owner has installed a new network. Data is correct before it is transmitted across the
network.
The company owner is concerned that data might have errors after transmission.
(a) Explain how the data might have errors after transmission.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) The company owner decides to introduce an error detection system to check the data for
errors after transmission.
The error detection system uses an odd parity check and a positive automatic repeat query
(ARQ).
(i) Describe how the error detection system operates to check for errors.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [8]
© UCLES 2024 0478/11/M/J/24
11
(ii) Give two other error detection methods that could be used.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(c) The company owner also installs a firewall to help protect the network from hackers and
malware.
(i) Explain how the firewall operates to help protect the network.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
(ii) Give two examples of malware that the firewall can help protect the network from.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.