June20 Sheet MS
June20 Sheet MS
Published
Students did not sit exam papers in the June 2020 series due to the Covid-19 global pandemic.
This mark scheme is published to support teachers and students and should be read together with the
question paper. It shows the requirements of the exam. The answer column of the mark scheme shows the
proposed basis on which Examiners would award marks for this exam. Where appropriate, this column also
provides the most likely acceptable alternative responses expected from students. Examiners usually review
the mark scheme after they have seen student responses and update the mark scheme if appropriate. In the
June series, Examiners were unable to consider the acceptability of alternative responses, as there were no
student responses to consider.
Mark schemes should usually be read together with the Principal Examiner Report for Teachers. However,
because students did not sit exam papers, there is no Principal Examiner Report for Teachers for the June
2020 series.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the June 2020 series for most Cambridge
IGCSE™ and Cambridge International A & AS Level components, and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
2 2
CLI GUI
4(b) 2
abnormal normal
AB
C
B
AO
Gender – 1 mark
= F – 1 mark
AND –1 mark
= A* – 1 mark
use of wildcard – 1 mark
Blood_group – 1 mark
The age changes every year therefore it will need to be changed regularly ...
... Administration of the database becomes more time consuming.
The age of the donor can be easily and automatically calculated from their
date of birth ...
... improving accuracy.
Comparisons
Both use the internet
Both redirect the user to a fake website
Both can lead to fraud and identity theft
Both use websites that look legitimate
Personal data is compromised
Differences
With phishing emails are sent to the computer
In pharming malicious code is uploaded to the computer
In phishing clicking a link sends user to a fake website
In pharming the code redirects the user to a fake website without their
knowledge
The email in phishing appears to have come from a trusted source
Website in pharming appears to be genuine
In pharming spyware can be used to record key presses
Avoid clicking on any unknown texts with links/Avoid clicking links in texts
from people you do not know.
Do not reply to text messages that have asked you about any of your
personal finances/details.
Be on the lookout for messages that contain the number 5000 or any
number that is not a phone number as this is used by smishers.
If the text messages urge you for a quick reply then that is a clear sign of
smishing.
Never call back a phone number that was associated with the text from an
unknown source.
If the text message was sent at an unusual time, then that is another sign of
smishing.
6 4
LAN WAN WLAN
Advantages
All elements are together in one unit therefore takes up less space
They are portable
Can be used in more places than a desktop
Disadvantages
Easier to steal/lose
Limited battery life so more likely to run out of power
Pointing devices can be more difficult to use
In built webcams can be more difficult to use rather than a desktop
If one piece of hardware breaks it can be more difficult to replace
Desktops have a better heat dispersion rate
More likely to be damaged as they are portable.
Screen size may be smaller
Less powerful
Benefits
If personal data is kept confidential then identity theft is reduced
It helps prevent fraud
Reduces the chance of users suffering harm from criminals, as less data for
criminals to attempt to access
Protects sensitive data
… examples:
racial/ethnic/political/religious/membership of trade unions/health/criminal
activity
Protects the data being used for purposes other than what it was collected
for
Drawbacks
Difficult to enforce as users give information freely
Most users do not read the terms and conditions before agreeing to them,
therefore allowing data to be used
Data protection is local but networks are global so laws are difficult to
enforce
Younger people do not mind that data is passed on therefore the law could
not be enforced for all
9(a) 6
Device Input Output Both
Buzzer
Receipt printer
Electronic scales
If less than the re-order level then the item is automatically re-ordered – 1
mark
Advantages
Fingerprints are unique
More accurate data entry
Improved security
Your fingerprints are with you all the time/cannot be lost/ID cards can be lost
Student needs to be present at the reader
Magnetic cards can be affected by magnetic fields/smart phones
Very difficult to clone unlike cards
Disadvantages
Takes a longer time to collect all the fingerprints and store them rather than
producing ID cards
Equipment would be more expensive
Damage to the finger/reader will give false readings/no reading
Invasion of privacy
11 Four from: 4
Data should be fairly and lawfully processed
Data should only be processed for the stated purpose
Data should be adequate, relevant and not excessive/limited
Data should not be kept longer than necessary
Data should be processed in accordance with the data subject’s rights
Data should be kept secure
Data should not be transferred to another country unless they have
adequate protection.
Data should be processed in a transparent manner
Data should be collected for specified/explicit/legitimate purposes
Data should only be further processed for archive purposes which is
compatible with the initial purposes
Data kept for archiving should safeguard the rights and freedoms of
individuals
Explicit consent required for processing sensitive data
Parental consent required for processing personal data of children including
online services
Data subjects are allowed access to their personal data
12 Magnetic stripe 8
Benefits
The user needs to have the card present to use it
Data more difficult to copy as it uses a stripe
Increased security as signature is also needed
Drawbacks
The card could be stolen and the signature copied
Magnetic stripe can be affected by magnetic fields
Card can be damaged due to overuse
Contactless
Benefits
More secure as encryption is used to read the card
Card details can be stored on a smartphone which might have an extra layer
of security
Stops shoulder surfing
Only allows a small amount to be transacted
Drawbacks
Someone who steals the card can use it without a PIN
Can be cloned using electronic devices
No contact with the device so other devices may ‘read’ the card accidentally
Security risk as the card contains personal information
To achieve full marks all three methods must be discussed, the discussion
must also cover both the benefits and drawbacks.
13 Four from: 4
Biometrics
Two-factor/two-step/multi-factor authentication
Magnetic stripes cards
Smart cards
Zero login
Physical Tokens
Electronic tokens
Digital certificates
Memorable information // security question
14 Zero login 6
Two from:
- Method of login authentication that identifies a user..
- ..by combining both biometric data and behavioural patterns..
- ..without the need to supply any other security information
Physical token
Two from:
- A form of authentication that uses a hardware device..
- .. that generates a one-time password (OTP)
- This OTP changes on a regular basis and is usually only valid for less than
a minute
Electronic token
Two from:
- Software installed on a user’s device (such as a smartphone)..
- ..that generates a one-time password (OTP) which valid for less than one
minute
Published
Students did not sit exam papers in the June 2020 series due to the Covid-19 global pandemic.
This mark scheme is published to support teachers and students and should be read together with the
question paper. It shows the requirements of the exam. The answer column of the mark scheme shows the
proposed basis on which Examiners would award marks for this exam. Where appropriate, this column also
provides the most likely acceptable alternative responses expected from students. Examiners usually review
the mark scheme after they have seen student responses and update the mark scheme if appropriate. In the
June series, Examiners were unable to consider the acceptability of alternative responses, as there were no
student responses to consider.
Mark schemes should usually be read together with the Principal Examiner Report for Teachers. However,
because students did not sit exam papers, there is no Principal Examiner Report for Teachers for the June
2020 series.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the June 2020 series for most Cambridge
IGCSE™ and Cambridge International A & AS Level components, and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1(a) 4
Text
Boolean Numeric
(alphanumeric)
Athlete_name
Gold_medal(Y/N)
Age
Name_of_Country
3 Bluetooth 4
Modem
Router
WiFi
One from:
Extreme: 1 or 10
Three from:
Add legend
Add chart title
Add axes labels
Remove gridlines
Change colour/thickness of the bars
5 Two from: 2
File transfer protocol
Used when transferring files from one computer to another over the internet
Comparisons
Both use communication devices to collect personal data
Both require the user to communicate quickly
Both require the user to enter personal data
Both use the internet
Differences
Smishing: fake text messages/SMS are sent to a phone
Phishing: fake emails are sent to your computer
In smishing the user may be asked to make a phone call
A smishing message is shorter than a phishing email
Easier to spot a smishing message
Smishing messages tend to use 5000 in the message
7(a) 3D printer 1
7(c) Buzzer 1
Advantages
Tablet computers are more portable
Can be used in more places than a desktop computer
Smaller footprint as the units are not separate
Powered by battery so can be used away from a power supply
Internet connection may be better as device is portable
Disadvantages
Tablet computers are easier to steal/lose
As the elements of a desktop computer are separate they are easier to
upgrade/tablet computers are one unit
Batteries can run out/desktop computers have less chance of running out of
power
Screens are smaller
Keyboard tends to be onscreen/touch screen therefore can be harder to use
No mouse therefore pointing devices/touchscreen can be harder to use
Webcams tend to be static therefore harder to use
Less standard ports/sockets
Desktop computers have a better heat dispersion rate
Desktop computers are less likely to be damaged as they are not portable.
Drawbacks
Security issue with the data being sent as passwords can be accessed
Leads to laziness as voice control used
Heavily reliant on power/battery power
Other people can hack devices
Reliant on the WiFi connection
Can be affected by walls/weather
Affected by distance from the WAP
Benefits
Smartphones can connect to the devices and can control them
Wireless so no tripping over wires
Voice control can be used to activate the devices
Home surveillance from afar
TV on demand
Keyless door locks are more secure
10(a) Interview members of the target audience to see what they want from the 2
presentation
Give out questionnaires to the target audience
One from:
Caused by continuous use of a keyboard
Caused by repetitive clicking of a mouse button
Differences
Optical discs such as CDs, DVDs and Blu-ray discs …
…. are read from and written to using a laser beam
Comparisons
Both store videos, music, files, images, data
Both are portable
Both use direct access
Both can be easily lost/stolen
Both backing storage
13 Six from: 6
- Internal memory is directly accessible by CPU while backing storage is not
directly accessible by the CPU
- Backing storage has slower access times // Internal memory has faster
access times
- Backing storage tends to have greater storage capacities
- Backing storage is non-volatile/permanent storage while internal memory
can be non-volatile and volatile
- Internal memory is fixed inside the computer while backing storage can
either be fixed or it can be removable
- Internal memory is more expensive per unit memory // Backing storage
is cheaper per unit memory
- Internal memory is used to store bootup instructions and can hold data
during processing while backing storage is used to store files and
software
- Internal storage is chip based while backing storage can be solid state,
optical or magnetic
- Internal memory examples RAM and ROM and backing storage examples
are HDD and SSD (any valid examples)
14 Six from: 6
A list of all the tests to be performed
Identifying what data is to be tested
Identifying what type of test data to be used
Identifying live data to be used
Identifying the expected outcomes from the testing
Checking that actual outcomes match the expected ones
15 5
User interface
Knowledge base
Rules base
Inference engine
Explanation systems
16 4
Four from:
- Information needs to be gathered from human experts or from written sources
such as textbooks, research papers or the internet
- The knowledge base is created, and information gathered is used to populate
the knowledge base
- A rules base is created
- This is made up of a series of inference rules so that the inference engine
can draw conclusions
- The inference engine is set up
- The user interface is created to allow the user and the expert system to
interact
- The expert system is tested against known scenarios and any changes are
made
Published
Students did not sit exam papers in the June 2020 series due to the Covid-19 global pandemic.
This mark scheme is published to support teachers and students and should be read together with the
question paper. It shows the requirements of the exam. The answer column of the mark scheme shows the
proposed basis on which Examiners would award marks for this exam. Where appropriate, this column also
provides the most likely acceptable alternative responses expected from students. Examiners usually review
the mark scheme after they have seen student responses and update the mark scheme if appropriate. In the
June series, Examiners were unable to consider the acceptability of alternative responses, as there were no
student responses to consider.
Mark schemes should usually be read together with the Principal Examiner Report for Teachers. However,
because students did not sit exam papers, there is no Principal Examiner Report for Teachers for the June
2020 series.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the June 2020 series for most Cambridge
IGCSE™ and Cambridge International A & AS Level components, and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 2
Applications System
Device driver
Linker
Photo-editing software
Spreadsheet
5 Four from: 4
Faster switch on as the operating system does not need to load
Lighter and smaller than a laptop computer therefore more portable
Don’t generate as much heat
Battery life tends to last longer
Smaller footprint
Easier to use the touch screen as the keyboard is not in the way
Less susceptible to viruses
Less parts//no separate peripherals, such as a mouse
Camera is easier to use
6(a) Gender 3
Boolean/text/string/alphanumeric
Membership_type
Text/alphanumeric/string
Year_joined
Numeric/integer/date
6(b) Two marks for all field names given; one mark for five field names 8
6(d) IF(E3=“Y”,VLOOKUP(D3,J$3:K$5,2)*F3,0) 6
Six from:
If the member is attending/if E3 is equal to Y
Then locate the type of member using the value in D3 ...
... in the range J3 to K5
Return the corresponding value from the second column
Multiply the returned value by F3/the number attending
Otherwise display 0 in the cell
Advantages
Facial recognition is unique therefore the correct person is identified
Tickets can be lost/stolen whereas your face is always with you
The commuter is charged for the ticket therefore more secure
Faster throughput/faster to check the commuters
Fear of detection reduces fraud
Disadvantages
Personal liberty infringement as facial data must be stored.
Equipment and setup is more expensive than manual system.
The time taken to set up a store of facial patterns can be more time
consuming
A database is needed as many passengers need to be stored
Passengers will have to have data stored on the system; this could take a
long time to set up
If the face is injured/damaged/covered/beard it could be more difficult to
read the data
7(b) 4
biometrics contactless physical
RFID
Magnetic stripe
Retina scan
Voice recognition
8 Similarities 6
They are both used to store data
They are both mass storage
Both can be secured by passwords
Differences
Internal backing storage – physical storage in the computer
Internal backing storage – the user has control of the storage
Cloud – automatic backup takes place
Cloud – only pay for what you use
Internal backing storage – only initial cost is required
Internal backing storage – difficult to expand the storage
Cloud – can be used on different devices
Cloud – needs access to the internet to be used
Cloud – due to duplicate copies more chance of the data being hacked
Cloud – more chance of it being hacked as it is on all the time
Max five marks if only differences have been given in the answer
Disadvantage:
The old system no longer exists therefore all data could be lost – 1 mark
Advantage:
One from:
The benefits are immediate
Costs are reduced as only one set of staff are needed
Less change of error as the new system will be fully tested
Advantage:
If the current part fails then not all the system is lost – 1 mark
Disadvantage:
One from:
More expensive as each part needs to be evaluated before moving on
More time consuming as each part needs to be evaluated before moving on
Disadvantage:
More time consuming as the changeover is spread out – 1 mark
Advantage:
One from:
If the system crashes/fails then only branch/office is affected
Cheaper as training is carried branch by branch
Less time consuming as training is carried out branch by branch
11 Six from: 6
Check the credentials of the authors of a website
Cross check the data with other websites
Check if the site has excessive advertising
Check If the advertising is related only to its own products
Check the final part of a URL …
... .ac., .gov, .org government/academic sites are usually fairly reliable
Check if site is endorsed by reliable/reputable people/organisations it can be
accepted as being reliable/If it has links to other reliable sites
Check the site for grammatical/spelling mistakes
Compare information from different text books to see if the results are
similar
Check if it has been recommended by teachers
Advantages
Intranet is policed/controlled by the school
More secure as it needs a password
Intranet private network only contains information that is relevant
Intranet resides behind a firewall therefore data is more secure
Messages can target the correct students
Better bandwidth on the intranet
Access from external people are barred
Disadvantages
More expensive to set up
More time consuming to set up
More time spent on administration i.e. passwords
May only be viewed within the school
More expensive to maintain
More time consuming to maintain
Will not be able to access school files at home for homework
School would need to provide more computers across the school for
students to use to access via the intranet