Cambridge IGCSE: 0417/12 Information and Communication Technology
Cambridge IGCSE: 0417/12 Information and Communication Technology
Cambridge IGCSE
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
11_0417_12_2022_1.13
© UCLES 2022 [Turn over
2
1 Complete the following sentences using the most appropriate words from this list of word processing
terms.
(c) The indentation of a paragraph where all the lines except the first are indented is called
hanging
........................................................................................................................................... [1]
(d) The last line of a paragraph that appears as the first line of the next page is called a
widow
........................................................................................................................................... [1]
2 Database, presentation, spreadsheet and word processing software are used by a medical centre.
Tick (✓) the most appropriate piece of software to carry out the tasks shown.
[4]
...........................................................................................................................................
it is better suited for devices with an on screen keyboard as typing in commands accurately
2 ........................................................................................................................................
would be very difficult
...........................................................................................................................................
there is no need to memorise execution commands and write them out with the
3 ........................................................................................................................................
correct syntax
- easy to enter commands
...........................................................................................................................................
- quick to enter commands
- do not need ot learn commands [3]
- less errors cus commands are not being types
- works with touch screen
...........................................................................................................................................
it is touch screen and utilises and on screen keyboard
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
4 Workers in an office log onto the office computer network using a password.
...........................................................................................................................................
a hacker can enter the network through arron's computer and place a worm
2 ........................................................................................................................................
...........................................................................................................................................
- contains personal info
- really short
- doesnt contain any numbers, special charcters or uppercase letters [2]
- repeated letters
(b) One method that hackers use to find people’s passwords is to install key-logging spyware onto
computers.
Give two methods that could be used to safely enter passwords even if key-logging spyware
has been installed on a computer.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
problem
solution
5 The secretary of a sports club is setting up a database of members to replace the current manual
system. He will need to create a database structure.
(a) Describe the steps involved in setting up and testing the database structure before it can be
once thay used in the new system.
start
first he has to gather information about the existing system as well as the criteria for the new
talking ...........................................................................................................................................
"steps" you
one such as user requirements, infromation requirement and technical requirements. then he
are not ...........................................................................................................................................
supposed
to describe
...........................................................................................................................................
a
theoretical setting up testing
process, ...........................................................................................................................................
- set up the dables - test w/ normla, abnormal and extreme data
we're - set the field names - if wrong,make corrections and test again
talking "he ...........................................................................................................................................
- set the data types and properties - lainch system -> test with live data
opened the - set foreign key and primary key
stupid ...........................................................................................................................................
- set relationships
computer, - create validation routines
tell them ...........................................................................................................................................
- create input forms
the steps"
........................................................................................................................................... [4]
When the new system is completed it needs to be implemented. The secretary of the sports club
can implement it using direct changeover or parallel running.
(b) Describe the term parallel running, giving one benefit and one drawback of using this method
of implementation.
...........................................................................................................................................
in case the new system fails the old one has the backup of data
Benefit ..............................................................................................................................
...........................................................................................................................................
it is expensive to operate both of them at once since there must be two sets of staff or the
Drawback ..........................................................................................................................
same staff will want to be paid higher for doing twice the work
...........................................................................................................................................
[3]
6 In June 2000 the London Millennium Bridge opened to the public but closed shortly afterwards for
repairs. The bridge was swaying as people walked across it. Before bridges are built, computer
models are produced and the models are tested.
..................................................................................................................................................
.................................................................................................................................................. [4]
7 A club has many members. The secretary of the club wants to keep details of the club members
in a database.
(a) Describe the benefits and drawbacks of storing membership details on a computer database.
you can use the database to easily create forms as well as reports on memberships.
...........................................................................................................................................
storing it in a computer instead of physically makes the information more portable and shareable.
...........................................................................................................................................
the secreatary can search the database for a particular record and find a result quickly.
...........................................................................................................................................
this way records can also be easily updated. the databse file can be encrypted if being shared
...........................................................................................................................................
which makes it safer and more secure. it may also be less expensive to stroe the details of so many
...........................................................................................................................................
members on a computer than on paper. however, it may e more complicated to work with a databse
...........................................................................................................................................
if the secratary is not well trained.
...........................................................................................................................................
- data can be backed up
...........................................................................................................................................
- "create reports" -> mail merging source
- data does not have to be rewritten -> takes less time -> red. errors
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(b) The secretary collects data from the members on paper-based forms.
...........................................................................................................................................
2 ........................................................................................................................................
ample space for data entry
...........................................................................................................................................
...........................................................................................................................................
large/visible font
4 ........................................................................................................................................
...........................................................................................................................................
high contrast colours
5 ........................................................................................................................................
...........................................................................................................................................
[5]
8 In 2019 Cambridge recorded the highest temperature for July in the UK. The data was collected
automatically using sensors by a weather station and sent to a computer.
Discuss the advantages and disadvantages of using sensors to collect data rather than humans
collecting the data.
sensrors are able to send their information immediately to microprocessors, they also read
..................................................................................................................................................
continuously and do not take breaks like humans so data is more likely to be up to date.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
- readings are taken frequently
- computers can analyse data frrequently
- multiple variables can be monitored at the same time
..................................................................................................................................................
..................................................................................................................................................
- sensors can malfunction
- sensors can be stolen
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [8]
this is a form of online external storage where files are kept in servers owned by the providing
...........................................................................................................................................
companies. cloud storage has some defining characteristics, users must have internet connection
...........................................................................................................................................
in order to access files but this means they can be accessed at any time and in any place
...........................................................................................................................................
with internet.
...........................................................................................................................................
...........................................................................................................................................
remote networked servers
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
managed by third party
- loss of control of the data
...........................................................................................................................................
- can be affected without knowdlege
........................................................................................................................................... [6]
As our use of the cloud increases, new ways of accessing it safely need to be developed.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
10 High street banks now offer customers access to internet banking when they are in the physical
bank.
Discuss the advantages and disadvantages to the bank of using internet banking in this way.
internet banking in the physical site eliminates the long quqes that form at banks as making
..................................................................................................................................................
transactions online is much faster. also, customers can still speak to a staff member or perform
..................................................................................................................................................
physical tasks that cannot be done via internet banking such as withdrawing cash or depositing
..................................................................................................................................................
cheques. it also makes provisions for customers who do not have access to internet on their own
..................................................................................................................................................
or who dont know how to use internet banking at all, they can still bank normally. it reduces the
..................................................................................................................................................
costs to the bank a they don't need so many normal banking terminals. howver, the bank has to
..................................................................................................................................................
provide stable internet connection to customers. it may also be counterintuitive and a waste
..................................................................................................................................................
of money since the people who know how to bank online willl just do o on their own rather than travel\
..................................................................................................................................................
to the bank for it..
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
11 A village is built next to a river. During heavy rain the river floods and endangers the people living
in the village. If the river is in danger of flooding, an email is sent to all members of the village.
(a) Explain why an email group is used when contacting the villagers.
this way, all villagers can be alerted at the same time and since this is a recurring message
...........................................................................................................................................
it can just be sent to the same group rather than the sender having to retype all their adresses
...........................................................................................................................................
every flood event.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
Sensors are placed in the river to check the water level. If the water level in the river rises more
than 5m above normal river levels, a flood barrier is raised to safeguard the village. The flood barrier
remains raised until the water level drops to normal levels.
(b) Explain why the data from the sensors cannot be read directly by the computer and name the
device that needs to be used so that the computer can read the data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
you know this
...........................................................................................................................................
........................................................................................................................................... [3]
(c) Describe how a microprocessor uses the data from the sensors to raise and lower the flood
barrier.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
you know this
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
Write down two features of a GUI and for each give a reason why they are needed.
icons
Feature 1 ..................................................................................................................................
what the user clicks on in order to execute the command
Reason 1 ..................................................................................................................................
..................................................................................................................................................
cursor
Feature 2 ..................................................................................................................................
to provide users with the ability to click on the icons
Reason 2 ..................................................................................................................................
..................................................................................................................................................
[4]
Describe how the use of computers has affected the work of employees and their working patterns.
most work is now done via computers i.e. document production, creating presentations, etc.
..................................................................................................................................................
it's a requirement for most occupations that employees have a laptop or that the office provides
..................................................................................................................................................
them with computers. in addition communication for work has changed too. now emails or
..................................................................................................................................................
phone calls or web meetings are used to maintain contact between each other.this in turn has
..................................................................................................................................................
made a lot more employees to work at home or use a hybrid timetable since all work and communication can
be done that
..................................................................................................................................................
..................................................................................................................................................
way. because of the incresed use of technology in the world, almost all employess are expected to be able to
use computers.
..................................................................................................................................................
..................................................................................................................................................
- increased productivity of staff
- secuiryt issues due to computer networks
..................................................................................................................................................
-inc skillls
- inc no of technician workers
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
...........................................................................................................................................
portable document format - standard image file
pdf .....................................................................................................................................
...........................................................................................................................................
[2]
...........................................................................................................................................
........................................................................................................................................... [3]
.................................................................................................................................................. [2]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.