KEMBAR78
Solved Oct v2 24 | PDF | Computer Data Storage | Antivirus Software
0% found this document useful (0 votes)
93 views12 pages

Solved Oct v2 24

This document is a Cambridge IGCSE Information and Communication Technology exam paper for October/November 2024, consisting of various questions covering topics such as software copyright, email communication, file formats, input/output devices, memory types, interfaces, expert systems, and network routers. It includes instructions for answering the questions and specifies that the total mark for the paper is 80. The document is structured to assess students' understanding of ICT concepts and applications.

Uploaded by

Omar Hady
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
93 views12 pages

Solved Oct v2 24

This document is a Cambridge IGCSE Information and Communication Technology exam paper for October/November 2024, consisting of various questions covering topics such as software copyright, email communication, file formats, input/output devices, memory types, interfaces, expert systems, and network routers. It includes instructions for answering the questions and specifies that the total mark for the paper is 80. The document is structured to assess students' understanding of ICT concepts and applications.

Uploaded by

Omar Hady
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

* 0000800000001 *

www.dynamicpapers.com
, ,


Cambridge IGCSE

¬Xw@4mIsQ¢MŠ@z6W
¬NHE•lLk{v™>P”FJ‚
¥ee•u•e•EuuU¥ ¥UuU

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*4079666034*

Paper 1 Theory October/November 2024


1 hour 30 minutes

You must answer on the question paper.


No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 80.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

11_0417_12_2024_1.6
© UCLES 2024 [Turn over
* 0000800000002 *
www.dynamicpapers.com
2

DO NOT WRITE IN THIS MARGIN


, ,

1 State two methods that software producers use to enforce software copyright legislation.

Serial numbers
1 ................................................................................................................................................
Product keys
2 ................................................................................................................................................

[2]

2 A headteacher is sending out emails to her staff.

DO NOT WRITE IN THIS MARGIN


(a) State what is meant by an email group.

A list of contacts to sends the same email to a number of people


...........................................................................................................................................

........................................................................................................................................... [1]

(b) State what is meant by carbon copy (cc).

Copy of email sent to other people at same time as original is sent


...........................................................................................................................................
so all reseavers can see who received the email
........................................................................................................................................... [1]

DO NOT WRITE IN THIS MARGIN


(c) State what is meant by an address book.

Stored list of email addresses


...........................................................................................................................................

........................................................................................................................................... [1]

(d) State what is meant by blind carbon copy (bcc).

Copy of email sent to other people at same time as original is sent without
...........................................................................................................................................
recipients knowing
........................................................................................................................................... [1]

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN

© UCLES 2024 ĬÖ÷Àĝ´íÉóÑĢÍĊ½ü¸ý× 11_0417_12_2024_1.6


ĬÎÆĂÈđàÞÔĆĄööæäîÂĂ
ĥõµĕµõĥõõµåĕĥÅąĕÕÕ
* 0000800000003 *
www.dynamicpapers.com
3
DO NOT WRITE IN THIS MARGIN

, ,

3 A computer uses a number of different generic file formats.

Describe each of the following generic file formats.

(a) pdf

Portable document format


...........................................................................................................................................
Can be read by most computers
...........................................................................................................................................
Hard to edit therefore it can be used to protect the file from change
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

........................................................................................................................................... [2]

(b) rtf

Rich text format


...........................................................................................................................................

...........................................................................................................................................
Readable by most text editors
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

........................................................................................................................................... [2]

(c) css

Cascading style sheet


...........................................................................................................................................
Attached to one or more web pages
...........................................................................................................................................
Written in HTML
...........................................................................................................................................
Defines how the web pages look
........................................................................................................................................... [2]
DO NOT WRITE IN THIS MARGIN

Part of the presentation layer


DO NOT WRITE IN THIS MARGIN

© UCLES 2024 ĬØ÷Àĝ´íÉóÑĢÍĊ½ú¸ý×


ĬÎÅāÀėäÎåôí³âÎøî²Ă
11_0417_12_2024_1.6 [Turn over
ĥõÅÕõĕąĕĥÅõĕĥåĥÕÅÕ
* 0000800000004 *
www.dynamicpapers.com
4

DO NOT WRITE IN THIS MARGIN


, ,

4 A desktop computer uses both input and output devices.

(a) Compare input and output devices. Your answer should include both similarities and differences.

Similarities
...........................................................................................................................................
Both are attached/connected to a computer
...........................................................................................................................................
Both handle data
...........................................................................................................................................
Both communicate with both the user and the computer
...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


Differences
...........................................................................................................................................
An input device sends data to a computer
...........................................................................................................................................
Input devices are controlled by the user
...........................................................................................................................................
An output device receives data from the computer
........................................................................................................................................... [4]
An output device displays data/plays sound

Output devices are controlled by the computer


(b) State three input devices that can be used with a desktop computer.

keybored

DO NOT WRITE IN THIS MARGIN


1 ........................................................................................................................................
mouse
2 ........................................................................................................................................
microphone
3 ........................................................................................................................................

[3]

(c) State three output devices that can be used with a desktop computer.

speaker
1 ........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


monitor
2 ........................................................................................................................................

printer
3 ........................................................................................................................................

[3]
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 ĬÖ÷Àĝ´íÉóÑĢÍĊ¿ü¸ÿ× 11_0417_12_2024_1.6


ĬÎÅĄÀčÒÛÒîö¼ĄòÖĞÊĂ
ĥÅĕÕµĕąµąĥąĕååÅÕÕÕ
* 0000800000005 *
www.dynamicpapers.com
5
DO NOT WRITE IN THIS MARGIN

, ,

5 A computer contains internal memory and backing storage.

Both ROM and RAM are examples of internal memory.

(a) Explain the differences between ROM and RAM.

RAM store data temporery while ROM is permanent memory


...........................................................................................................................................

...........................................................................................................................................
RAM is volatile while ROM is non-volatile
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................
RAM can read from and writtin too memroy while ROM is read only memory
...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]
DO NOT WRITE IN THIS MARGIN

(b) Describe the characteristics of backing storage.

Non-volatile
...........................................................................................................................................
Permanent storage
...........................................................................................................................................
Storage devices have slow access rates
...........................................................................................................................................
Large storage
...........................................................................................................................................
secondary storage
...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

........................................................................................................................................... [4]
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 ĬØ÷Àĝ´íÉóÑĢÍĊ¿ú¸ÿ×


ĬÎÆăÈěÎëçČċíØĊĂкĂ
11_0417_12_2024_1.6 [Turn over
ĥÅĥĕõõĥÕĕĕÕĕåÅåĕÅÕ
* 0000800000006 *
www.dynamicpapers.com
6

DO NOT WRITE IN THIS MARGIN


, ,

6 A dialogue based interface can be used to program a satellite navigation device in a vehicle.

Discuss the benefits and drawbacks of using a dialogue based interface in this scenario.

Benefits:
..................................................................................................................................................

Allows hands free control


..................................................................................................................................................
Speeds up the entry of data
..................................................................................................................................................
Distraction free interface
..................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


Simpler system for the driver
..................................................................................................................................................
Less errors made on data entry
..................................................................................................................................................

Drawbacks:
..................................................................................................................................................
Background noise can affect the data entry
..................................................................................................................................................
Less features than other interfaces
..................................................................................................................................................
Issues with accents/understanding commands
..................................................................................................................................................
The user needs to be trained with the system

DO NOT WRITE IN THIS MARGIN


Commands need to be spoken clearly
..................................................................................................................................................
Commands may have to be learnt
.................................................................................................................................................. [6]
May have a limited number of commands
7 (a) Describe the processing and the outputs that are used in an expert system.

The inference engine searches/matches the user’s answers


...........................................................................................................................................
The knowledge base is searched using the rules base
...........................................................................................................................................

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


Diagnoses/probabilities of the solution/results are produced
...........................................................................................................................................
Explanation of how the solution was found is displayed
...........................................................................................................................................
The question is displayed on the screen
........................................................................................................................................... [3]

(b) Write down three examples of expert systems.

Financial advice
1 ........................................................................................................................................
Tax systems
2 ........................................................................................................................................
Careers
DO NOT WRITE IN THIS MARGIN

3 ........................................................................................................................................

[3]

© UCLES 2024 ĬÚ÷Àĝ´íÉóÑĢÍĊ¾úµý× 11_0417_12_2024_1.6


ĬÎÅăËđ¶áßÿúĈ¸òģÆÊĂ
ĥĕÅĕõÕĥõÕõõĕĥÅąÕĕÕ
* 0000800000007 *
www.dynamicpapers.com
7
DO NOT WRITE IN THIS MARGIN

, ,

8 Phablet computers can be used rather than smartphones.

Discuss the advantages and disadvantages of using a phablet computer rather than a smartphone.

Larger screen so less strain on the eyes


..................................................................................................................................................
Larger screen allows many users to view the screen at the same time
..................................................................................................................................................

..................................................................................................................................................

Larger onscreen keyboard making data entry easier


..................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

Larger onscreen keyboard means less typing errors


..................................................................................................................................................
Higher memory storage allows for faster processing
..................................................................................................................................................

..................................................................................................................................................
A phablet computer has a larger footprint
..................................................................................................................................................
A smartphone is more portable
..................................................................................................................................................

A smartphone is harder to get stealen that a phablet as it smaller


..................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

..................................................................................................................................................

.................................................................................................................................................. [6]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 ĬÜ÷Àĝ´íÉóÑĢÍĊ¾üµý×


ĬÎÆĄÃėºÑÚùćÁĤĊ·ÆºĂ
11_0417_12_2024_1.6 [Turn over
ĥĕµÕµµąĕÅąåĕĥåĥĕąÕ
* 0000800000008 *
www.dynamicpapers.com
8

DO NOT WRITE IN THIS MARGIN


,  ,

9 A router can be used to connect networks and devices to the internet.

(a) Identify the other two operations of a router.

Storing computer addresses


1 ........................................................................................................................................

...........................................................................................................................................
Routing data packets
2 ........................................................................................................................................

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


[2]

(b) Explain how a router connects devices to the internet.

A router connects to a modem using an Ethernet cable


...........................................................................................................................................
Receives data packets from the internet/other devices
...........................................................................................................................................
Transmits data packets to the internet/other devices
...........................................................................................................................................
The data packet contains an IP address

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................
The router reads the data packet
...........................................................................................................................................
The router reads the destination IP address
...........................................................................................................................................
The router stores IP addresses in its routing table
...........................................................................................................................................
Checks/searches for the IP address in its routing table
........................................................................................................................................... [4]
Finds the best path for each packet to reach its destination uses routing table

The router will use the IP address to work out the best route

If it cannot find the best route it uses the default one

DO NOT WRITE IN THIS MARGIN


Uses an IP address with each of the devices on the network

The router sends/forwards the packet to the next router DO NOT WRITE IN THIS MARGIN

© UCLES 2024 ĬÚ÷Àĝ´íÉóÑĢÍĊÀúµÿ× 11_0417_12_2024_1.6


ĬÎÆāÃčÌØÝ÷ĀÊÂæĕÖÂĂ
ĥåĥÕõµąµååÕĕååÅĕĕÕ
* 0000800000009 *
www.dynamicpapers.com
9
DO NOT WRITE IN THIS MARGIN

,  ,

10 An electronic token is used as an authentication method.

(a) Explain what is meant by an electronic token.

A piece of software/data
...........................................................................................................................................
Authorises access to a network
...........................................................................................................................................
The token is sent to the user after they log in
...........................................................................................................................................
It sends a single-use code this token is active for a short period of time
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

Provides an extra security layer


...........................................................................................................................................

........................................................................................................................................... [4]

(b) The data on a computer system can be protected by anti-virus software and anti-malware
software.

(i) Describe the features of anti-virus software.

Protects the computer against computer viruses


................................................................................................................................
DO NOT WRITE IN THIS MARGIN

Identifies a virus with those stored in its database


................................................................................................................................
Prevents malicious script from running
................................................................................................................................
Alerts the user that a virus is found
................................................................................................................................
It is a security method
................................................................................................................................
Removes/quarantines viruses
................................................................................................................................ [3]
DO NOT WRITE IN THIS MARGIN

(ii) Describe the features of anti-malware software.

Protects against malware/malicious software


................................................................................................................................
Detects more advanced forms of malware
................................................................................................................................

Finds source codes that indicate a threat


................................................................................................................................
It is a security method
................................................................................................................................
Warns of the threat if it identifies malware
................................................................................................................................
Contains a database of code
................................................................................................................................ [3]
DO NOT WRITE IN THIS MARGIN

Removes the malware

© UCLES 2024 ĬÜ÷Àĝ´íÉóÑĢÍĊÀüµÿ×


ĬÎÅĂËěÈèÜāñÿĖÎÁÖ²Ă
11_0417_12_2024_1.6 [Turn over
ĥåĕĕµÕĥÕµÕąĕåÅåÕąÕ
* 0000800000010 *
www.dynamicpapers.com
10

DO NOT WRITE IN THIS MARGIN


, ,

11 The secretary of a club writes a monthly newsletter which is sent out to its members. She is
considering producing an ePublication of the newsletter.

(a) State four characteristics of an ePublication.

Can auto change of pages


1 ........................................................................................................................................

...........................................................................................................................................
Can be used in other documents
2 ........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................
More up-to-date as edited versions can be uploaded quicky
3 ........................................................................................................................................

...........................................................................................................................................

Readers can interact with the ePublication


4 ........................................................................................................................................
The system can read the ePublication to the user
...........................................................................................................................................

[4]

DO NOT WRITE IN THIS MARGIN


(b) Give two other uses of ePublications.

eBooks
1 ........................................................................................................................................
journals
2 ........................................................................................................................................

[2]

12 Analysis includes identifying the hardware and software requirements of a new system.

DO NOT WRITE IN THIS MARGIN


(a) Describe other tasks involved in analysis.

Collecting data about the current system


...........................................................................................................................................
Establishing the problem that the customer needs solving
...........................................................................................................................................
Finding the problems with the current system
...........................................................................................................................................
Identifying the user requirements of the new system
...........................................................................................................................................
Identifying the inputs, processing, outputs of the current system Producing a
...........................................................................................................................................
cost-benefit analysis
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

........................................................................................................................................... [4]

© UCLES 2024 ĬÚ÷Àĝ´íÉóÑĢÍĊ½ú·ý× 11_0417_12_2024_1.6


ĬÎÇāÊďÄÂãðćĤÞèñкĂ
ĥõąĕõµåµąĕÕÕåąÅĕåÕ
* 0000800000011 *
www.dynamicpapers.com
11
DO NOT WRITE IN THIS MARGIN

, ,

(b) The identification of hardware and software requirements forms part of the system specification.

Explain what is meant by the system specification.

This describes the configuration for the system


...........................................................................................................................................
Used in the production of the system specification document
...........................................................................................................................................
States the performance requirements of the system
...........................................................................................................................................
Specifies the security requirements of system
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

........................................................................................................................................... [3]

(c) After analysis of the system, the file and data structures are designed.

State three elements that need to be designed as part of the file and data structures.

Field length
1 ........................................................................................................................................
Field name
2 ........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

Data type
3 ........................................................................................................................................
Primary key
Foreign key [3]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 ĬÜ÷Àĝ´íÉóÑĢÍĊ½ü·ý× 11_0417_12_2024_1.6


ĬÎÈĂÂęÀ²ÖĊúåúÐåĞÊĂ
ĥõõÕµÕÅÕĕĥąÕåĥåÕµÕ
* 0000800000012 *
www.dynamicpapers.com
12

DO NOT WRITE IN THIS MARGIN


, ,

BLANK PAGE

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2024 ĬÚ÷Àĝ´íÉóÑĢÍĊ¿ú·ÿ× 11_0417_12_2024_1.6


ĬÎÈăÂē®·áĈñÞÜôćî²Ă
ĥÅåÕõÕÅõõÅõÕĥĥąÕåÕ

You might also like