0% found this document useful (0 votes)
2K views12 pages

03 0417 12 Afp m25 10022025

This document is an examination paper for the Cambridge IGCSE Information and Communication Technology (0417/12) for February/March 2025. It includes instructions for candidates, a variety of questions related to computer systems, software, and data management, and guidelines for answering the questions. The total duration of the exam is 1 hour and 30 minutes, with a total of 80 marks available.

Uploaded by

shankari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views12 pages

03 0417 12 Afp m25 10022025

This document is an examination paper for the Cambridge IGCSE Information and Communication Technology (0417/12) for February/March 2025. It includes instructions for candidates, a variety of questions related to computer systems, software, and data management, and guidelines for answering the questions. The total duration of the exam is 1 hour and 30 minutes, with a total of 80 marks available.

Uploaded by

shankari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

* 0000800000001 *

, ,


Cambridge IGCSE

¬Xw@4nFyU¢=Š_ŠeW
¬D3¥-:xYdtƒª}J5i‚
¥u•U5UeUEeuU55uEUU

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*6482677815*

Paper 1 Theory February/March 2025


1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 80.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

03_0417_12_2025_1.10
© UCLES 2025 [Turn over
* 0000800000002 *
2

DO NOT WRITE IN THIS MARGIN


, ,

1 Circle two input devices.

Actuator Blu-ray disc Cloud Keyboard

Flash
Hard disk Mouse SD card
memory

[2]

DO NOT WRITE IN THIS MARGIN


2 A computer system uses applications software and system software.

(a) Describe the following software.

(i) Spreadsheet

................................................................................................................................

................................................................................................................................

................................................................................................................................

DO NOT WRITE IN THIS MARGIN


................................................................................................................................ [2]

(ii) Database

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

DO NOT WRITE IN THIS MARGIN


(iii) Applet

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

(b) State three types of system software.


DO NOT WRITE IN THIS MARGIN

1.........................................................................................................................................

2.........................................................................................................................................

3.........................................................................................................................................
[3]

© UCLES 2025 ĬÖ÷Àĝ´îÆùÕ̽ĊÞČçý× 03_0417_12_2025_1.10


ĬıĦ°®ô¯Ûýõąè÷úýáĂ
ĥåąÕõµĥµõĥåĕµõĕąõÕ
* 0000800000003 *
3
DO NOT WRITE IN THIS MARGIN

, ,

3 A doctor uses an expert system to diagnose a patient’s illness.

(a) Describe how expert systems produce diagnoses of an illness.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(b) Explain how an expert system could produce an incorrect diagnosis of an illness.

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

4 A company is creating a customer database. The database needs to be tested with live data.

(a) Explain what is meant by live data.

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

........................................................................................................................................... [1]

(b) Explain the issues associated with using live data to test this database.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]
DO NOT WRITE IN THIS MARGIN

© UCLES 2025 ĬØ÷Àĝ´îÆùÕ̽ĊÞĊçý×


ĬIJĥ¸¼ð¿ÞûČÄôÿÞýÑĂ
03_0417_12_2025_1.10 [Turn over
ĥåõĕµÕąÕĥĕõĕµĕõÅĥÕ
* 0000800000004 *
4

DO NOT WRITE IN THIS MARGIN


, ,

(c) A test strategy was produced for this database.

Explain what is meant by a test strategy.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

DO NOT WRITE IN THIS MARGIN


5 The cloud can be used for computer gaming. One major issue is the protection of personal data.

(a) Discuss, apart from the protection of personal data, the benefits and drawbacks of gaming on
the cloud.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................

........................................................................................................................................... [6]

(b) Encryption can be used to protect personal data when gaming.

Explain what is meant by encryption.

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

........................................................................................................................................... [2]

© UCLES 2025 ĬÖ÷Àĝ´îÆùÕ̽ĊàČçÿ× 03_0417_12_2025_1.10


ĬIJĨ¸²þÊÙõăËÒãĀčéĂ
ĥĕåĕõÕąõąµąĕõĕÕÅõÕ
* 0000800000005 *
5
DO NOT WRITE IN THIS MARGIN

, ,

(c) One player wants to send the list of players and their scores to a friend as an attachment.

State the precautions that need to be taken when sending and receiving the attachment.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

........................................................................................................................................... [3]

6 Some friends are planning to explore a remote area of India. They need to stay in contact with their
families and can either use a smartphone or a satellite phone.

Evaluate the use of a satellite phone rather than a smartphone in this scenario.

..................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]
DO NOT WRITE IN THIS MARGIN

© UCLES 2025 ĬØ÷Àĝ´îÆùÕ̽ĊàĊçÿ×


Ĭıħ°¸ĂºàăîþĆÛÜčÙĂ
03_0417_12_2025_1.10 [Turn over
ĥĕÕÕµµĥĕĕÅÕĕõõµąĥÕ
* 0000800000006 *
6

DO NOT WRITE IN THIS MARGIN


, ,

7 A company is planning to implement a new computer software system. It is going to use direct
changeover. One of the reasons for using this method is that the benefits are immediate.

(a) Discuss other benefits and drawbacks of using this method of implementation.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(b) Explain what is meant by the benefits are immediate.

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

8 State one example of a device that can be used to read data from the following storage media.

DO NOT WRITE IN THIS MARGIN


(a) Optical

........................................................................................................................................... [1]

(b) Magnetic

........................................................................................................................................... [1]

(c) Solid-state

........................................................................................................................................... [1]
DO NOT WRITE IN THIS MARGIN

© UCLES 2025 ĬÚ÷Àĝ´îÆùÕ̽ĊÝĊæý× 03_0417_12_2025_1.10


ĬIJħ³®Ī´èĈÿ÷Ħã¹µéĂ
ĥÅõÕµĕĥµÕåõĕµõĕŵÕ
* 0000800000007 *
7
DO NOT WRITE IN THIS MARGIN

, ,

9 Computers use Network Interface Cards (NIC).

(a) Explain the purpose of a Network Interface Card (NIC).

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(b) A user wishes to connect a set of Bluetooth headphones to a computer.


DO NOT WRITE IN THIS MARGIN

Describe how the headphones can be connected to the computer by Bluetooth.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

........................................................................................................................................... [4]
DO NOT WRITE IN THIS MARGIN

© UCLES 2025 ĬÜ÷Àĝ´îÆùÕ̽ĊÝČæý×


ĬıĨ»¼ĦÄÑòò²²ÛĝµÙĂ
03_0417_12_2025_1.10 [Turn over
ĥÅąĕõõąÕÅÕåĕµĕõąåÕ
* 0000800000008 *
8

DO NOT WRITE IN THIS MARGIN


,  ,

10 A company is planning to replace its computer system. It will need to carry out an analysis of the
current system.

(a) State the information about the current system that needs to be identified.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(b) A system specification is created during the analysis.

Explain the purpose of a system specification.

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

11 A company is developing a piece of software. The company needs to have a clear sense of audience
for its software so that it will be suitable for the users.

DO NOT WRITE IN THIS MARGIN


One of the characteristics that needs to be considered is the expectations of the user.

(a) State two other characteristics that need to be considered.

1.........................................................................................................................................

2.........................................................................................................................................
[2]
DO NOT WRITE IN THIS MARGIN

© UCLES 2025 ĬÚ÷Àĝ´îÆùÕ̽ĊßĊæÿ× 03_0417_12_2025_1.10


Ĭıĥ»²ĘÅæðù¹Ĕ÷¿åáĂ
ĥõÕĕµõąõåõÕĕõĕÕąµÕ
* 0000800000009 *
9
DO NOT WRITE IN THIS MARGIN

,  ,

(b) The developers are concerned about their software being pirated.

Describe three methods the company could use to help prevent software piracy.

Method 1............................................................................................................................

Description.........................................................................................................................

...........................................................................................................................................

Method 2............................................................................................................................
DO NOT WRITE IN THIS MARGIN

Description.........................................................................................................................

...........................................................................................................................................

Method 3............................................................................................................................

Description.........................................................................................................................

...........................................................................................................................................
[6]
DO NOT WRITE IN THIS MARGIN

12 Parents are worried about their children’s use of the internet.

(a) Explain how parents could monitor the use of the internet by their children.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

........................................................................................................................................... [3]

(b) Explain how the parents could control the use of the internet by their children.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2025 ĬÜ÷Àĝ´îÆùÕ̽ĊßČæÿ×


ĬIJĦ³¸ĜµÓĊĈðÈÿěåÑĂ
03_0417_12_2025_1.10 [Turn over
ĥõåÕõĕĥĕµąąĕõõµÅåÕ
* 0000800000010 *
10

DO NOT WRITE IN THIS MARGIN


, ,

13 (a) State the need for generic file formats.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Give two examples of generic file formats used for images.

DO NOT WRITE IN THIS MARGIN


1.........................................................................................................................................

2.........................................................................................................................................
[2]

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

© UCLES 2025 ĬÚ÷Àĝ´îÆùÕ̽ĊÞĊèý× 03_0417_12_2025_1.10


ĬÄ´ĥ²´ĐÓì÷òēðõëčÙĂ
ĥåµÕµõåõąÅÕÕõµÕąąÕ
DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN

© UCLES 2025
,
* 0000800000011 *

ĥåÅĕõĕÅĕĕµąÕõÕµÅĕÕ
ĬijĦº¶ĔãÍāÿÖìýïčéĂ
ĬÜ÷Àĝ´îÆùÕ̽ĊÞČèý×
,
11

BLANK PAGE

03_0417_12_2025_1.10
* 0000800000012 *
12

DO NOT WRITE IN THIS MARGIN


, ,

BLANK PAGE

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2025 03_0417_12_2025_1.10


ĬÚ÷Àĝ´îÆùÕ̽ĊàĊèÿ×
Ĭijħº°ĢæêÿĈÍĊáÍýÑĂ
ĥĕĕĕµĕŵõĕõÕµÕĕÅąÕ

You might also like