0% found this document useful (0 votes)
29 views16 pages

Cambridge IGCSE: 0417/12 Information and Communication Technology

This document is an examination paper for Cambridge IGCSE Information and Communication Technology, covering various topics such as software applications, database management, and the use of technology in real-world scenarios. It includes instructions for answering questions, a variety of question formats, and specific tasks related to ICT concepts. The paper aims to assess students' understanding and application of ICT knowledge in practical situations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views16 pages

Cambridge IGCSE: 0417/12 Information and Communication Technology

This document is an examination paper for Cambridge IGCSE Information and Communication Technology, covering various topics such as software applications, database management, and the use of technology in real-world scenarios. It includes instructions for answering questions, a variety of question formats, and specific tasks related to ICT concepts. The paper aims to assess students' understanding and application of ICT knowledge in practical situations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Cambridge IGCSE

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12


*5122596074*

Paper 1 Theory October/November 2022


2 hours

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

11_0417_12_2022_1.13
© UCLES 2022 [Turn over
2

1 Complete the following sentences using the most appropriate words from this list of word processing
terms.

bullet centred gutter hanging header


justified landscape orphan portrait widow

(a) The orientation of a page that is wider than it is high is called


landscape
........................................................................................................................................... [1]

(b) A symbol placed in front of each item in a list is called a


bullet
........................................................................................................................................... [1]

(c) The indentation of a paragraph where all the lines except the first are indented is called

hanging
........................................................................................................................................... [1]

(d) The last line of a paragraph that appears as the first line of the next page is called a
widow
........................................................................................................................................... [1]

2 Database, presentation, spreadsheet and word processing software are used by a medical centre.

Tick (✓) the most appropriate piece of software to carry out the tasks shown.

database presentation spreadsheet word processing


(✓) (✓) (✓) (✓)
Producing a letter to send out to t
patients

Creating graphs to show


numbers of people attending the t
medical centre

Creating queries from patients’ t


details

Creating an interactive display t


of services offered

[4]

© UCLES 2022 11_0417_12_2022_1.13


3

3 Smartphones use a Graphical User Interface (GUI).

(a) Give three benefits of using a GUI.

it is more user friendly as users click on icons to execute commands


1 ........................................................................................................................................

...........................................................................................................................................
it is better suited for devices with an on screen keyboard as typing in commands accurately
2 ........................................................................................................................................
would be very difficult
...........................................................................................................................................
there is no need to memorise execution commands and write them out with the
3 ........................................................................................................................................
correct syntax
- easy to enter commands
...........................................................................................................................................
- quick to enter commands
- do not need ot learn commands [3]
- less errors cus commands are not being types
- works with touch screen

(b) Give three characteristics of a smartphone.


small in size so it acts as a handheld device
1 ........................................................................................................................................

...........................................................................................................................................
it is touch screen and utilises and on screen keyboard
2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

- connectivity - connects via wifi, 3g, 4g, 5g, nfc [3]


- camera
- audio
- messaging

© UCLES 2022 11_0417_12_2022_1.13 [Turn over


4

4 Workers in an office log onto the office computer network using a password.

(a) Aaron is using his name as his password.

Give two reasons why this is not a good idea.

any of his colleagues can easily guess that as his password


1 ........................................................................................................................................

...........................................................................................................................................
a hacker can enter the network through arron's computer and place a worm
2 ........................................................................................................................................

...........................................................................................................................................
- contains personal info
- really short
- doesnt contain any numbers, special charcters or uppercase letters [2]
- repeated letters

(b) One method that hackers use to find people’s passwords is to install key-logging spyware onto
computers.

Give two methods that could be used to safely enter passwords even if key-logging spyware
has been installed on a computer.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

[2]

problem

- cannot type password


- your password is being monitored

solution

- drop down password lists -> no typing involved


- use OTPs -> even if the password is monitored, it changes each time so they's always got the
wrong one
- biometric authentication -> no passwords at allll

© UCLES 2022 11_0417_12_2022_1.13


5

5 The secretary of a sports club is setting up a database of members to replace the current manual
system. He will need to create a database structure.

(a) Describe the steps involved in setting up and testing the database structure before it can be
once thay used in the new system.
start
first he has to gather information about the existing system as well as the criteria for the new
talking ...........................................................................................................................................
"steps" you
one such as user requirements, infromation requirement and technical requirements. then he
are not ...........................................................................................................................................
supposed
to describe
...........................................................................................................................................
a
theoretical setting up testing
process, ...........................................................................................................................................
- set up the dables - test w/ normla, abnormal and extreme data
we're - set the field names - if wrong,make corrections and test again
talking "he ...........................................................................................................................................
- set the data types and properties - lainch system -> test with live data
opened the - set foreign key and primary key
stupid ...........................................................................................................................................
- set relationships
computer, - create validation routines
tell them ...........................................................................................................................................
- create input forms
the steps"
........................................................................................................................................... [4]

When the new system is completed it needs to be implemented. The secretary of the sports club
can implement it using direct changeover or parallel running.

(b) Describe the term parallel running, giving one benefit and one drawback of using this method
of implementation.

Parallel running .................................................................................................................


both thw new and old systems are run at the same time

...........................................................................................................................................
in case the new system fails the old one has the backup of data
Benefit ..............................................................................................................................

...........................................................................................................................................
it is expensive to operate both of them at once since there must be two sets of staff or the
Drawback ..........................................................................................................................
same staff will want to be paid higher for doing twice the work
...........................................................................................................................................

[3]

© UCLES 2022 11_0417_12_2022_1.13 [Turn over


6

6 In June 2000 the London Millennium Bridge opened to the public but closed shortly afterwards for
repairs. The bridge was swaying as people walked across it. Before bridges are built, computer
models are produced and the models are tested.

Explain why computer models are used before building a bridge.


it is less expensive to test a bridge with a computer model than to build it, test it and still rework.
..................................................................................................................................................
multiple possible solutions to a problem can be tested out.-> due to the amount of resources it would require
..................................................................................................................................................
it. it is also much safer this way as no lives are risked. builders can eve alter the conditions set
..................................................................................................................................................
in the model to replicate specific or extreme situations that may not occur when the bridge is to
..................................................................................................................................................
be tested.
..................................................................................................................................................

there will be less errors/repairs after being built


..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [4]

7 A club has many members. The secretary of the club wants to keep details of the club members
in a database.

(a) Describe the benefits and drawbacks of storing membership details on a computer database.
you can use the database to easily create forms as well as reports on memberships.
...........................................................................................................................................
storing it in a computer instead of physically makes the information more portable and shareable.
...........................................................................................................................................
the secreatary can search the database for a particular record and find a result quickly.
...........................................................................................................................................
this way records can also be easily updated. the databse file can be encrypted if being shared
...........................................................................................................................................
which makes it safer and more secure. it may also be less expensive to stroe the details of so many
...........................................................................................................................................
members on a computer than on paper. however, it may e more complicated to work with a databse
...........................................................................................................................................
if the secratary is not well trained.

...........................................................................................................................................
- data can be backed up
...........................................................................................................................................
- "create reports" -> mail merging source
- data does not have to be rewritten -> takes less time -> red. errors
...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 11_0417_12_2022_1.13


7

(b) The secretary collects data from the members on paper-based forms.

Describe five features of a well-designed paper-based data capture form.

makes use of white space


1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................
ample space for data entry

...........................................................................................................................................

make use of radio buttons/multiple choice options


3 ........................................................................................................................................

...........................................................................................................................................
large/visible font
4 ........................................................................................................................................

...........................................................................................................................................
high contrast colours
5 ........................................................................................................................................

...........................................................................................................................................

[5]

© UCLES 2022 11_0417_12_2022_1.13 [Turn over


8

8 In 2019 Cambridge recorded the highest temperature for July in the UK. The data was collected
automatically using sensors by a weather station and sent to a computer.

Discuss the advantages and disadvantages of using sensors to collect data rather than humans
collecting the data.
sensrors are able to send their information immediately to microprocessors, they also read
..................................................................................................................................................
continuously and do not take breaks like humans so data is more likely to be up to date.
..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................
- readings are taken frequently
- computers can analyse data frrequently
- multiple variables can be monitored at the same time
..................................................................................................................................................

..................................................................................................................................................
- sensors can malfunction
- sensors can be stolen
..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [8]

© UCLES 2022 11_0417_12_2022_1.13


9

9 Many organisations store data in the cloud.

(a) Explain what is meant by the ICT term cloud.

this is a form of online external storage where files are kept in servers owned by the providing
...........................................................................................................................................

companies. cloud storage has some defining characteristics, users must have internet connection
...........................................................................................................................................
in order to access files but this means they can be accessed at any time and in any place
...........................................................................................................................................
with internet.
...........................................................................................................................................

...........................................................................................................................................
remote networked servers
........................................................................................................................................... [3]

(b) Explain the issues of storing data in the cloud.


the cloud providers are entirely responsible for data safety and of someone hacks into their
...........................................................................................................................................
network, users' sensitive data can be accessed/exposed/stolen. the cloud requires internet
...........................................................................................................................................
connection in order to access files and if users try to do so in slow networks files may be
...........................................................................................................................................
corrupted. the cost of storing data in the cloud is considered relatively expensive compared
...........................................................................................................................................
to physical methods like HDD an SSD.
...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
managed by third party
- loss of control of the data
...........................................................................................................................................
- can be affected without knowdlege

- py subscription fee while hdd is one


...........................................................................................................................................
fee
-
...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 11_0417_12_2022_1.13 [Turn over


10

As our use of the cloud increases, new ways of accessing it safely need to be developed.

(c) The use of typed passwords is being replaced by biometric methods.

Discuss the benefits and drawbacks of using biometric methods.


biometric methods such as fingerprints and retina scan are very secure as they are hard
...........................................................................................................................................
to replicate/copy so unwanted users will find it very difficukt to break into the cloud. biometric
...........................................................................................................................................
data is also very unique to each individual, do not wear easily and cannot be "forgotten" like
...........................................................................................................................................
PINs and passwords. biometric methods require advanced biometric readers which are not]
...........................................................................................................................................
very accessible.
...........................................................................................................................................
- expensive
...........................................................................................................................................
- biometrics change so mussed be updated
- takes time to reset
...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

© UCLES 2022 11_0417_12_2022_1.13


11

10 High street banks now offer customers access to internet banking when they are in the physical
bank.

Discuss the advantages and disadvantages to the bank of using internet banking in this way.
internet banking in the physical site eliminates the long quqes that form at banks as making
..................................................................................................................................................
transactions online is much faster. also, customers can still speak to a staff member or perform
..................................................................................................................................................

physical tasks that cannot be done via internet banking such as withdrawing cash or depositing
..................................................................................................................................................
cheques. it also makes provisions for customers who do not have access to internet on their own
..................................................................................................................................................
or who dont know how to use internet banking at all, they can still bank normally. it reduces the
..................................................................................................................................................
costs to the bank a they don't need so many normal banking terminals. howver, the bank has to
..................................................................................................................................................
provide stable internet connection to customers. it may also be counterintuitive and a waste
..................................................................................................................................................

of money since the people who know how to bank online willl just do o on their own rather than travel\
..................................................................................................................................................
to the bank for it..
..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

11 A village is built next to a river. During heavy rain the river floods and endangers the people living
in the village. If the river is in danger of flooding, an email is sent to all members of the village.

(a) Explain why an email group is used when contacting the villagers.
this way, all villagers can be alerted at the same time and since this is a recurring message
...........................................................................................................................................
it can just be sent to the same group rather than the sender having to retype all their adresses
...........................................................................................................................................
every flood event.
...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

© UCLES 2022 11_0417_12_2022_1.13 [Turn over


12

Sensors are placed in the river to check the water level. If the water level in the river rises more
than 5m above normal river levels, a flood barrier is raised to safeguard the village. The flood barrier
remains raised until the water level drops to normal levels.

(b) Explain why the data from the sensors cannot be read directly by the computer and name the
device that needs to be used so that the computer can read the data.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
you know this
...........................................................................................................................................

........................................................................................................................................... [3]

(c) Describe how a microprocessor uses the data from the sensors to raise and lower the flood
barrier.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
you know this

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2022 11_0417_12_2022_1.13


13

12 A computer system uses a Graphical User Interface (GUI).

Write down two features of a GUI and for each give a reason why they are needed.
icons
Feature 1 ..................................................................................................................................
what the user clicks on in order to execute the command
Reason 1 ..................................................................................................................................

..................................................................................................................................................
cursor
Feature 2 ..................................................................................................................................
to provide users with the ability to click on the icons
Reason 2 ..................................................................................................................................

..................................................................................................................................................

[4]

13 Computers are being used in offices.

Describe how the use of computers has affected the work of employees and their working patterns.
most work is now done via computers i.e. document production, creating presentations, etc.
..................................................................................................................................................
it's a requirement for most occupations that employees have a laptop or that the office provides
..................................................................................................................................................
them with computers. in addition communication for work has changed too. now emails or
..................................................................................................................................................
phone calls or web meetings are used to maintain contact between each other.this in turn has
..................................................................................................................................................
made a lot more employees to work at home or use a hybrid timetable since all work and communication can
be done that
..................................................................................................................................................

..................................................................................................................................................
way. because of the incresed use of technology in the world, almost all employess are expected to be able to
use computers.
..................................................................................................................................................

..................................................................................................................................................
- increased productivity of staff
- secuiryt issues due to computer networks
..................................................................................................................................................
-inc skillls
- inc no of technician workers
..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [6]

© UCLES 2022 11_0417_12_2022_1.13 [Turn over


14

14 rtf and pdf are file types.

(a) Describe what is meant by an rtf and a pdf file type.


rich text format - unfromatted text files
rtf ......................................................................................................................................

...........................................................................................................................................
portable document format - standard image file
pdf .....................................................................................................................................

...........................................................................................................................................

[2]

(b) Explain the differences between the two file types.


rtf is used for text that has no special font or colour and is also not formatted into
...........................................................................................................................................
a table. rtf files are easy to edit and can be opened on many word porcessing applications
...........................................................................................................................................
but pdf files require dedicated editing applications.
...........................................................................................................................................
rtf files can take a different format depending on the appliccation it is used in but pdf
maintains its format in any application
...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

15 Proofreading is often confused with visual verification.

Describe the differences between proofreading and visual verification.


proofreading is the manual or automated check of the grammar, speeling and punctuation
..................................................................................................................................................
of a text while visual verification is performed by a human and is focused on making sure the
..................................................................................................................................................
text entered is accurate to the original source it was retyped from.
..................................................................................................................................................

.................................................................................................................................................. [2]

© UCLES 2022 11_0417_12_2022_1.13


15

BLANK PAGE

© UCLES 2022 11_0417_12_2022_1.13


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 11_0417_12_2022_1.13

You might also like