Solved Oct v2 24
Solved Oct v2 24
www.dynamicpapers.com
, ,
™
Cambridge IGCSE
¬Xw@4mIsQ¢M@z6W
¬NHElLk{v>PFJ
¥eeueEuuU¥ ¥UuU
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 80.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
11_0417_12_2024_1.6
© UCLES 2024 [Turn over
* 0000800000002 *
www.dynamicpapers.com
2
1 State two methods that software producers use to enforce software copyright legislation.
Serial numbers
1 ................................................................................................................................................
Product keys
2 ................................................................................................................................................
[2]
........................................................................................................................................... [1]
........................................................................................................................................... [1]
Copy of email sent to other people at same time as original is sent without
...........................................................................................................................................
recipients knowing
........................................................................................................................................... [1]
, ,
(a) pdf
........................................................................................................................................... [2]
(b) rtf
...........................................................................................................................................
Readable by most text editors
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
........................................................................................................................................... [2]
(c) css
(a) Compare input and output devices. Your answer should include both similarities and differences.
Similarities
...........................................................................................................................................
Both are attached/connected to a computer
...........................................................................................................................................
Both handle data
...........................................................................................................................................
Both communicate with both the user and the computer
...........................................................................................................................................
keybored
[3]
(c) State three output devices that can be used with a desktop computer.
speaker
1 ........................................................................................................................................
printer
3 ........................................................................................................................................
[3]
DO NOT WRITE IN THIS MARGIN
, ,
...........................................................................................................................................
RAM is volatile while ROM is non-volatile
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
RAM can read from and writtin too memroy while ROM is read only memory
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
DO NOT WRITE IN THIS MARGIN
Non-volatile
...........................................................................................................................................
Permanent storage
...........................................................................................................................................
Storage devices have slow access rates
...........................................................................................................................................
Large storage
...........................................................................................................................................
secondary storage
...........................................................................................................................................
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
........................................................................................................................................... [4]
DO NOT WRITE IN THIS MARGIN
6 A dialogue based interface can be used to program a satellite navigation device in a vehicle.
Discuss the benefits and drawbacks of using a dialogue based interface in this scenario.
Benefits:
..................................................................................................................................................
Drawbacks:
..................................................................................................................................................
Background noise can affect the data entry
..................................................................................................................................................
Less features than other interfaces
..................................................................................................................................................
Issues with accents/understanding commands
..................................................................................................................................................
The user needs to be trained with the system
...........................................................................................................................................
Financial advice
1 ........................................................................................................................................
Tax systems
2 ........................................................................................................................................
Careers
DO NOT WRITE IN THIS MARGIN
3 ........................................................................................................................................
[3]
, ,
Discuss the advantages and disadvantages of using a phablet computer rather than a smartphone.
..................................................................................................................................................
..................................................................................................................................................
A phablet computer has a larger footprint
..................................................................................................................................................
A smartphone is more portable
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
Routing data packets
2 ........................................................................................................................................
...........................................................................................................................................
The router will use the IP address to work out the best route
The router sends/forwards the packet to the next router DO NOT WRITE IN THIS MARGIN
, ,
A piece of software/data
...........................................................................................................................................
Authorises access to a network
...........................................................................................................................................
The token is sent to the user after they log in
...........................................................................................................................................
It sends a single-use code this token is active for a short period of time
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
........................................................................................................................................... [4]
(b) The data on a computer system can be protected by anti-virus software and anti-malware
software.
11 The secretary of a club writes a monthly newsletter which is sent out to its members. She is
considering producing an ePublication of the newsletter.
...........................................................................................................................................
Can be used in other documents
2 ........................................................................................................................................
...........................................................................................................................................
[4]
eBooks
1 ........................................................................................................................................
journals
2 ........................................................................................................................................
[2]
12 Analysis includes identifying the hardware and software requirements of a new system.
...........................................................................................................................................
........................................................................................................................................... [4]
, ,
(b) The identification of hardware and software requirements forms part of the system specification.
...........................................................................................................................................
........................................................................................................................................... [3]
(c) After analysis of the system, the file and data structures are designed.
State three elements that need to be designed as part of the file and data structures.
Field length
1 ........................................................................................................................................
Field name
2 ........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
Data type
3 ........................................................................................................................................
Primary key
Foreign key [3]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.