0% found this document useful (0 votes)
30 views321 pages

0478 Paper 1 Revision Booklet 2021 24

Uploaded by

azizbek2akk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views321 pages

0478 Paper 1 Revision Booklet 2021 24

Uploaded by

azizbek2akk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 321

Presidential School in Karshi

Paper
reference 0478/01

Computer Science
PAPER 1: Principles of Computer Science

Candidate surname Other names

PAST PAPER BOOKLET - PAPER 1


Cambridge IGCSE™
* 3 0 5 1 9 9 1 3 9 5 *

COMPUTER SCIENCE 0478/11


Paper 1 Theory May/June 2021

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (LK/SG) 202678/4
© UCLES 2021 [Turn over
2

1 Benedict has a computer that is assigned an Internet Protocol (IP) address. The IP address is:

198.167.214.0

The IP address is represented as denary values.

(a) Convert the denary values 167 and 214 from the IP address to 8-bit binary.

167

214

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(b) Benedict’s computer is also assigned a Media Access Control (MAC) address.

(i) Identify one similarity between an IP address and a MAC address.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Identify two differences between an IP address and a MAC address.

Difference 1 .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Difference 2 .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2021 0478/11/M/J/21


3

2 Julia inputs personal data into her computer.

She stores three copies of the data using a hard disk drive (HDD), a solid state drive (SSD) and a
USB flash memory drive.

(a) Identify three devices Julia can use to input personal data into her computer.

Device 1 ....................................................................................................................................

Device 2 ....................................................................................................................................

Device 3 ....................................................................................................................................
[3]

(b) Six statements are shown about HDDs, SSDs and USB flash memory drives.

Tick (✓) to show which statements apply to each type of storage. Some statements can apply
to more than one type of storage.

USB flash
memory
Statement
HDD SSD drive
(✓) (✓) (✓)

it has no moving parts

it is non-volatile

it can use NAND gates to store data

it uses magnetic properties to store data

it has the smallest physical size

it has the slowest read/write speeds


[6]

© UCLES 2021 0478/11/M/J/21 [Turn over


4

(c) Julia uses a USB connection to transfer data onto her USB flash memory drive.

(i) One benefit of using a USB connection is that it is a universal connection.

State two other benefits of using a USB connection.

Benefit 1 ............................................................................................................................

...........................................................................................................................................

Benefit 2 ............................................................................................................................

...........................................................................................................................................
[2]

(ii) Identify the type of data transmission used in a USB connection.

..................................................................................................................................... [1]

© UCLES 2021 0478/11/M/J/21


5

3 A firewall can be used to help keep the data secure that is stored on a computer.

(a) The given paragraph describes how the firewall operates to help keep the data secure.

Complete the paragraph using the most appropriate terms from the given list. Not all of the
terms on the list need to be used.

• Accept
• Criteria
• Hacking
• Input
• Network
• Outgoing
• Output
• Processor
• Reject
• Software
• Store
• Storage

A firewall can be ............................................ or hardware based. It monitors traffic between

the computer and the ............................................ The user sets ............................................

for the traffic. The firewall will .............................................. or ............................................

the traffic based on this. It can help prevent ............................................ and malicious

software that could be a threat to the security of the data.


[6]

(b) Identify three other methods that could be used to keep the data secure.

Method 1 ...................................................................................................................................

Method 2 ...................................................................................................................................

Method 3 ...................................................................................................................................
[3]

© UCLES 2021 0478/11/M/J/21 [Turn over


6

4 Two internet risks are phishing and pharming.

Describe what is meant by phishing and pharming.

Phishing ...........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Pharming ..........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[6]

© UCLES 2021 0478/11/M/J/21


7

5 Jamelia has a greenhouse that she uses to grow fruit and vegetables. She needs to make sure
the temperature in the greenhouse stays between 25 °C and 30 °C (inclusive).

A system that has a temperature sensor and a microprocessor is used to maintain the temperature
in the greenhouse. The system will:

• open a window and turn a heater off if it gets too hot


• close a window and turn a heater on if it gets too cold.

Describe how the system uses the temperature sensor and the microprocessor to maintain the
temperature in the greenhouse.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2021 0478/11/M/J/21 [Turn over


8

6 Consider the logic statement:

X = (((A AND B) OR (C AND NOT B)) XOR NOT C)

(a) Draw a logic circuit to represent the given logic statement.

Do not attempt to simplify the statement. All logic gates must have a maximum of two inputs.

B X

[6]

© UCLES 2021 0478/11/M/J/21


9

(b) Consider the completed truth table for the given logic statement.

Row Working space


A B C X
number

1 0 0 0 0

2 0 0 1 1

3 0 1 0 0

4 0 1 1 1

5 1 0 0 0

6 1 0 1 1

7 1 1 0 0

8 1 1 1 1

There are four errors in the truth table in the output (X) column.

Identify the four incorrect outputs.

Write the row number to identify each incorrect output.

Row ........................

Row ........................

Row ........................

Row ........................
[4]

© UCLES 2021 0478/11/M/J/21 [Turn over


10

7 A music company has a website that allows users to stream music. The music is stored in sound
files.

(a) The sound files are compressed using lossless compression.

(i) Describe how the sound files are compressed using lossless compression.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) State one reason why the music company would compress the sound files using
lossless, rather than lossy, compression.

...........................................................................................................................................

..................................................................................................................................... [1]

(iii) Give one benefit, to the user, of the music company compressing the sound files.

...........................................................................................................................................

..................................................................................................................................... [1]

(iv) Give one drawback of the music company using lossless, rather than lossy, compression
for the sound files.

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2021 0478/11/M/J/21


11

(b) Describe how the web pages for the website are requested and displayed on a user’s
computer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(c) The web server that hosts the website suffers a denial of service (DoS) attack.

Explain why this will prevent users from accessing the website.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2021 0478/11/M/J/21 [Turn over


12

8 Four 7-bit binary values are transmitted from one computer to another. A parity bit is added to
each binary value creating 8-bit binary values. All the binary values are transmitted and received
correctly.

(a) Identify whether each 8-bit binary value has been sent using odd or even parity by writing odd
or even in the type of parity column.

8-bit binary value Type of parity

01100100

10010001

00000011

10110010
[4]

(b) An error may not be detected when using a parity check.

Identify why an error may not be detected.

...................................................................................................................................................

............................................................................................................................................. [1]

(c) The data is sent using parallel half-duplex data transmission.

(i) Describe how data is sent using parallel half-duplex data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) State two drawbacks of using parallel data transmission.

Drawback 1 .......................................................................................................................

...........................................................................................................................................

Drawback 2 .......................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2021 0478/11/M/J/21


13

BLANK PAGE

© UCLES 2021 0478/11/M/J/21


14

BLANK PAGE

© UCLES 2021 0478/11/M/J/21


15

BLANK PAGE

© UCLES 2021 0478/11/M/J/21


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 0478/11/M/J/21


Cambridge IGCSE™
* 1 8 7 5 9 9 1 1 3 6 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory May/June 2021

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (DH/SG) 202677/4
© UCLES 2021 [Turn over
2

1 A denary value can be converted into hexadecimal and binary.

(a) Complete the table to show the hexadecimal and 8-bit binary values of the given denary
values.

Denary Hexadecimal 8-bit binary

49

123

200

[6]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Give two benefits, to users, of converting binary values to hexadecimal.

Benefit 1 ....................................................................................................................................

...................................................................................................................................................

Benefit 2 ....................................................................................................................................

...................................................................................................................................................
[2]

(c) Hexadecimal is used to represent Hypertext Markup Language (HTML) colour codes in
computer science.

Identify three other ways that hexadecimal is used in computer science.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2021 0478/12/M/J/21


3

2 Data storage can be magnetic, solid state or optical.

(a) Six statements are given about data storage.

Tick (3) to show if the statement applies to magnetic, solid state or optical storage. Some
statements may apply to more than one type of storage.

Magnetic Solid state Optical


Statement
(3) (3) (3)
no moving parts are used to store data

pits and lands are used to store data

data is stored on platters

flash memory is used to store data

parts are rotated to store data

data can be stored permanently


[6]

(b) (i) Give one example of magnetic storage.

..................................................................................................................................... [1]

(ii) Give one example of optical storage.

..................................................................................................................................... [1]

(iii) Identify which type of storage would be the most suitable for use in a web server and
justify your choice.

Type of storage ..................................................................................................................

Justification ........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

(c) Describe the operation of USB flash memory and how it stores data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2021 0478/12/M/J/21 [Turn over


4

3 Consider the logic statement:

X = ((((NOT A AND B) OR C) AND B) NOR (B OR C))

(a) Draw a logic circuit to represent the given logic statement.

Do not attempt to simplify the statement. All logic gates must have a maximum of two inputs.

B X

[6]

© UCLES 2021 0478/12/M/J/21


5

(b) Consider the completed truth table for the given logic statement.

Row Working space


A B C X
number
1 0 0 0 1

2 0 0 1 1

3 0 1 0 1

4 0 1 1 0

5 1 0 0 1

6 1 0 1 0

7 1 1 0 1

8 1 1 1 1

There are four errors in the truth table in the output (X) column.

Identify the four incorrect outputs.

Write the row number to identify each incorrect output.

Row .......................

Row .......................

Row .......................

Row .......................
[4]

© UCLES 2021 0478/12/M/J/21 [Turn over


6

4 Three types of Internet security risk are virus, spyware and denial of service (DoS) attack.

(a) Six statements are given about Internet security risks.

Tick (3) to show whether the statement applies to virus, spyware or denial of service. Some
statements may apply to more than one Internet security risk.

Denial of
Statement Virus Spyware service
(3) (3) (3)
captures all data entered using a keyboard

can be installed onto a web server

prevents access to a website

is malicious code on a computer

is self-replicating

damages the files on a user’s hard drive


[6]

(b) Identify three other types of Internet security risks.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(c) Some Internet security risks can maliciously damage data. Data can also be damaged
accidentally.

State three ways that data could be accidentally damaged.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2021 0478/12/M/J/21


7

5 A security light system is used by a factory. The light only comes on when it is dark and when
movement is detected. The light will stay on for 1 minute before switching off.

Sensors and a microprocessor are used to control the security light system.

(a) Identify two sensors that would be used in the security light system.

Sensor 1 ...................................................................................................................................

Sensor 2 ...................................................................................................................................
[2]

(b) Describe how the sensors and the microprocessor control the security light system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [8]

© UCLES 2021 0478/12/M/J/21 [Turn over


8

6 Cookies can be used to store a user’s personal data and online browsing habits.

(a) A cookie could be used to automatically enter a user’s payment details when the user makes
a purchase online.

Describe how cookies can be used to store and automatically enter a user’s payment details.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Explain why a user may be concerned about their personal data and online browsing habits
being stored in cookies.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 0478/12/M/J/21


9

7 Jolene uses HTML to create a website. She separates the HTML into structure and presentation.

(a) (i) Give one example of HTML structure.

..................................................................................................................................... [1]

(ii) Give two examples of HTML presentation.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(b) Explain why Jolene separates the HTML into structure and presentation.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

8 A keyboard is a type of input device that can be used to enter data into a computer.

Complete the paragraph that describes one method of operation for a keyboard, using the most
appropriate terms from the given list. Not all terms in the list need to be used.

• Binary
• Breaks
• Calculated
• Character
• Circuit
• Current
• Information
• Network
• Press
• Processor
• Signal
• Switch

A keyboard has a key matrix underneath the keys. When a key is pressed, it presses a

............................................. that completes a ............................................. . This allows

............................................. to flow. The location of the key pressed is

............................................. . The location of the key pressed is compared to a

............................................. map to find the ............................................. value for the key that

has been pressed.


[6]

© UCLES 2021 0478/12/M/J/21


10

BLANK PAGE

© UCLES 2021 0478/12/M/J/21


11

BLANK PAGE

© UCLES 2021 0478/12/M/J/21


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 0478/12/M/J/21


Cambridge IGCSE™
* 3 0 8 8 7 7 7 2 2 4 *

COMPUTER SCIENCE 0478/13


Paper 1 Theory May/June 2021

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (DH/SG) 202681/5
© UCLES 2021 [Turn over
2

1 Greta has a computer that she uses for schoolwork and leisure.

(a) The computer has the Media Access Control (MAC) address:

00:A0:C9:14:C8:29

(i) Tick (3) to show whether the MAC address is initially assigned to the computer by the
network, the manufacturer or the user.

Tick (3)

Network

Manufacturer

User

[1]

(ii) The values in the MAC address are hexadecimal values.

Convert the three given hexadecimal values into 8-bit binary.

14 ......................................................................................................................................

A0 ......................................................................................................................................

C9 ......................................................................................................................................
[3]

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(iii) Convert the two given hexadecimal values into denary.

29 ......................................................................................................................................

C8 ......................................................................................................................................
[2]

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

© UCLES 2021 0478/13/M/J/21


3

(b) Greta stores data on several off-line storage devices, including an external hard disk drive
(HDD), a USB flash memory drive and a compact disc (CD).

(i) Identify the type of storage for each device.

External HDD ....................................................................................................................

USB flash memory drive ...................................................................................................

CD .....................................................................................................................................
[3]

(ii) Describe the operation of a HDD and how it stores data.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2021 0478/13/M/J/21 [Turn over


4

2 Jolene displays videos on her website. She uses lossy compression to reduce the file size of the
videos.

(a) Describe how lossy compression reduces the file size of the videos.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) State two reasons why Jolene would use lossy rather than lossless compression for the
videos.

Reason 1 ..................................................................................................................................

...................................................................................................................................................

Reason 2 ..................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2021 0478/13/M/J/21


5

3 An optical mouse is a type of input device that can be used to input data into a computer system.

(a) Complete the paragraph about the operation of an optical mouse, using the most appropriate
terms from the given list. Not all terms need to be used.

• Ball
• Battery
• LCD
• LED
• Lens
• Magnifies
• Matrix
• Microswitch
• Photoelectric
• Photographic
• Reduces
• USB

An optical mouse shines an ............................................ from the bottom of the mouse onto a

surface. Light bounces straight back from the surface into a ............................................ cell.

This has a ............................................ that ............................................ the reflected light to

allow detection of smaller movements. When a button on the mouse is clicked, a

............................................ is pressed. A ............................................ connection is used to

carry the data to the computer.


[6]

(b) Identify two other input devices that can be used to enter data into a computer.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

© UCLES 2021 0478/13/M/J/21 [Turn over


6

4 Spencer finds out that his online music account has been accessed by an unauthorised person.

He believes his personal details for the account were obtained using phishing.

(a) Explain how the personal details could have been obtained using phishing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Give two other Internet security risks that could have been used to obtain the personal
details.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

© UCLES 2021 0478/13/M/J/21


7

5 Six statements are given about programming languages.

Tick (3) to show whether each statement applies to high-level language, assembly language or
machine code. Some statements may apply to more than one type of programming language.

High-level Assembly Machine


Statement language language code
(3) (3) (3)
it requires a translator to be processed by a
computer

it is an example of low-level language

it uses mnemonics

it uses English-like statements

it can be used to directly manipulate hardware in


the computer

it is portable

[6]

© UCLES 2021 0478/13/M/J/21 [Turn over


8

6 Four 7-bit binary values are transmitted from one computer to another. A parity bit is added to
each binary value creating 8-bit binary values. All the binary values are transmitted and received
correctly.

(a) Identify whether each 8-bit binary value has been sent using odd or even parity by writing odd
or even in the type of parity column.

8-bit binary value Type of parity

01111100

10010000

10011001

00101001

[4]

(b) The 8-bit binary value 10110001 is transmitted and received as 10110010

A parity check does not identify any errors in the binary value received.

State why the parity check does not identify any errors.

...................................................................................................................................................

............................................................................................................................................. [1]

(c) The data is sent using serial duplex data transmission.

(i) Describe how data is sent using serial duplex data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) State one drawback of using serial data transmission, rather than parallel data
transmission.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2021 0478/13/M/J/21


9

7 Marco uses his computer for work. The data he uses on a daily basis is valuable to his business.

Marco is concerned about his data being accidentally damaged. Human error, such as incorrectly
removing external storage devices, is one way that the data can be accidentally damaged.

(a) Identify two other ways that data can be accidentally damaged.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Removing storage devices correctly from the computer can help prevent data being
accidentally damaged.

Give two other ways that accidental damage to data can be prevented.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2021 0478/13/M/J/21 [Turn over


10

8 Consider the following logic circuit:

X
B

(a) Two NOT gates are used in the given logic circuit.

Identify three other logic gates that are used in the given logic circuit.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2021 0478/13/M/J/21


11

(b) Consider the completed truth table for the given logic circuit.

Row Working space


A B C X
number
1 0 0 0 0

2 0 0 1 1

3 0 1 0 0

4 0 1 1 0

5 1 0 0 1

6 1 0 1 1

7 1 1 0 0

8 1 1 1 1

There are four errors in the truth table in the output (X) column.

Identify the four incorrect outputs.

Write the row number to identify each incorrect output.

Row .......................

Row .......................

Row .......................

Row .......................
[4]

© UCLES 2021 0478/13/M/J/21 [Turn over


12

9 An underground car park has a system that checks the height of vehicles. A vehicle can be no
higher than 1.8 metres to enter the car park.

The system also counts the number of vehicles that have entered the car park, so that it can
display how many parking spaces are still available.

Each parking space has a red and a green light above it. If a car is parked in the parking space
only the red light is on, otherwise only the green light is on.

Sensors and a microprocessor are used to control the system.

(a) Complete the table to identify a suitable sensor for each part of the system.

Task Sensor

check if a vehicle is too high

count the vehicles entering the car park

check if a vehicle is parked in a parking space

[3]

(b) Describe how the sensor and the microprocessor are used to display the red or green light
above the parking space.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2021 0478/13/M/J/21


13

10 Several components are involved in processing an instruction in a Von Neumann model for a
computer system.

Three of these components are the arithmetic logic unit (ALU), control unit (CU) and random
access memory (RAM).

(a) Six statements are given about the components.

Tick (3) to show if each statement applies to the ALU, CU or the RAM. Some statements may
apply to more than one component.

ALU CU RAM
Statement
(3) (3) (3)
stores data and instructions before they enter the central
processing unit (CPU)

contains a register called the accumulator

manages the transmission of data and instructions to the


correct components

contained within the CPU

uses the data bus to send data into or out of the CPU

carries out calculations on data

[6]

(b) The accumulator is a register that is part of the Von Neumann model.

Give two other registers that are part of the Von Neumann model.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

© UCLES 2021 0478/13/M/J/21


14

BLANK PAGE

© UCLES 2021 0478/13/M/J/21


15

BLANK PAGE

© UCLES 2021 0478/13/M/J/21


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 0478/13/M/J/21


Cambridge IGCSE™
* 7 2 3 3 0 0 5 5 8 3 *

COMPUTER SCIENCE 0478/11


Paper 1 Theory May/June 2022

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (PQ) 303750/3
© UCLES 2022 [Turn over
2

1 Jack has an MP3 file stored on his computer.

(a) (i) Tick (3) to show which type of data is stored in an MP3 file.

Tick (3)

Video

Sound

Image
[1]

(ii) Tick (3) to show whether the MP3 file is a lossy compressed file or a lossless compressed
file or not a compressed file.

Tick (3)

Lossy compressed file

Lossless compressed file

Not a compressed file


[1]

2 A computer is designed using the Von Neumann model for a computer system.

The computer has a central processing unit (CPU).

(a) Data is fetched from primary storage into the CPU to be processed.

(i) State the name of the primary storage from where data is fetched.

..................................................................................................................................... [1]

(ii) The CPU performs a cycle to process data. Fetch is the first stage in this cycle.

State the names of the second and third stages in the cycle.

Second stage ....................................................................................................................

Third stage ........................................................................................................................


[2]

(iii) Identify two components within the CPU that are used in the fetch stage of the cycle.

Component 1 .....................................................................................................................

Component 2 .....................................................................................................................
[2]

© UCLES 2022 0478/11/M/J/22


3

3 Three types of storage media are magnetic, optical and solid state.

(a) One example of solid‑state storage is a Solid State Drive (SSD).

Identify one other example of solid‑state storage.

............................................................................................................................................. [1]

(b) Optical storage uses a laser to store and read data from a disk.

Explain how the laser is used to store and read data from the disk.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(c) A business is creating a new mobile device that has an SSD as secondary storage.

(i) Give three reasons why an SSD is the most suitable secondary storage for their mobile
device.

Reason 1 ...........................................................................................................................

...........................................................................................................................................

Reason 2 ...........................................................................................................................

...........................................................................................................................................

Reason 3 ...........................................................................................................................

...........................................................................................................................................
[3]

(ii) Identify two examples of software that can be stored on the SSD.

Example 1 .........................................................................................................................

Example 2 .........................................................................................................................
[2]

© UCLES 2022 0478/11/M/J/22 [Turn over


4

4 All data needs to be converted to binary data so that it can be processed by a computer.

(a) Explain why a computer can only process binary data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) The denary values 64, 101 and 242 are converted to 8‑bit binary values.

Give the 8‑bit binary value for each denary value.

64 ..............................................................................................................................................

101 ............................................................................................................................................

242 ............................................................................................................................................
[3]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(c) The hexadecimal values 42 and CE are converted to binary.

Give the binary value for each hexadecimal value.

42 ..............................................................................................................................................

CE .............................................................................................................................................
[4]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2022 0478/11/M/J/22


5

5 An image is stored on a computer. The image is 16‑bit colour and is 100 pixels high and
150 pixels wide.

Calculate the file size of the image in bytes. Show all your working.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Answer ................................................ bytes


[3]

6 A compiler and an interpreter are two different types of translator.

(a) One similarity between a compiler and an interpreter is that they both translate high‑level
language into machine code.

(i) Give one other similarity between a compiler and an interpreter.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Explain two differences between a compiler and an interpreter.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2022 0478/11/M/J/22 [Turn over


6

7 Adele chooses to set a biometric password for her mobile device, instead of a
personal identification number (PIN).

(a) State what is meant by a biometric password.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Give two reasons why a biometric password is more secure than a PIN.

Reason 1 ..................................................................................................................................

...................................................................................................................................................

Reason 2 ..................................................................................................................................

...................................................................................................................................................
[2]

(c) Adele has a software‑based firewall installed on her mobile device.

The firewall gathers data about the traffic coming into and going out of her mobile device.

Explain how the firewall uses the gathered data to keep the mobile device more secure.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(d) Adele also encrypts the data on her mobile device to keep it more secure.

State how encryption will keep the data more secure.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2022 0478/11/M/J/22


7

BLANK PAGE

© UCLES 2022 0478/11/M/J/22 [Turn over


8

8 Consider the following logic statement:

X = (((A AND NOT B) OR (NOT (B NOR C))) AND C)

(a) Draw a logic circuit to represent the given logic statement.

Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.

B X

[6]

© UCLES 2022 0478/11/M/J/22


9

(b) Complete the truth table for the given logic statement.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2022 0478/11/M/J/22 [Turn over


10

9 Three Internet terms are browser, Internet Protocol (IP) address and
Uniform Resource Locator (URL).

Five statements are given about the Internet terms.

Tick (3) to show which statements apply to each Internet term. Some statements may apply to
more than one Internet term.

Browser IP address URL


Statement
(3) (3) (3)

it contains the domain name

it is a type of software

it converts Hypertext Markup Language (HTML)


to display web pages

it is a type of address

it stores cookies

[5]

10 Many devices have a Media Access Control (MAC) address.

Give three features of a MAC address.

Feature 1 ..........................................................................................................................................

..........................................................................................................................................................

Feature 2 ..........................................................................................................................................

..........................................................................................................................................................

Feature 3 ..........................................................................................................................................

..........................................................................................................................................................
[3]

© UCLES 2022 0478/11/M/J/22


11

11 (a) The paragraph describes the process of printing a document using an inkjet printer.

Complete the paragraph using the most appropriate terms from the list. Not all of the terms in
the list need to be used.

• binary
• buffer
• drum
• information
• interrupt
• laser
• liquid
• nozzles
• operating system
• powder
• thermal bubble
• toner

Data is sent from the computer to the printer. The data is held in a print

........................................................................ that is temporary storage until the data is

processed to be printed.

Inkjet printers operate by having a print head that moves

........................................................................ side to side across the page. These

spray ........................................................................ ink droplets onto the page. These ink

droplets can be created using piezoelectric or ........................................................................

technology.

If the paper jams in the printing process, the printing stops and an

........................................................................ is sent to the computer.


[5]

(b) A printer is one example of an output device.

Give three other examples of output devices.

Example 1 .................................................................................................................................

Example 2 .................................................................................................................................

Example 3 .................................................................................................................................
[3]

(c) Give three examples of input devices.

Example 1 .................................................................................................................................

Example 2 .................................................................................................................................

Example 3 .................................................................................................................................
[3]
© UCLES 2022 0478/11/M/J/22 [Turn over
12

12 Computer ethics are a concern for any users of the Internet.

Identify and describe three ethical issues that could be a concern when using the Internet.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 0478/11/M/J/22


Cambridge IGCSE™
* 4 9 1 4 2 9 0 2 3 5 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory May/June 2022

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages.

DC (RW) 303775/2
© UCLES 2022 [Turn over
2

1 (a) Denary values are converted to binary values to be processed by a computer.

Draw one line from each denary value to the correctly converted 8‑bit binary value.

Denary 8-bit binary

00100001

41
10100110

00101001

174

10000110

10101110
86

01010110

[3]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Binary values can also be converted to denary values.

Give the correct denary value for the 12‑bit binary value 000101010111
Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Denary value ..........................................................


[2]

© UCLES 2022 0478/12/M/J/22


3

2 Hexadecimal is used for Hypertext Markup Language (HTML) colour codes.

An HTML colour code is:


#2F15D6
Each pair of digits is stored as binary in an 8‑bit register.

(a) Give the 8‑bit binary value that would be stored for each pair of hexadecimal digits.

2F

15

D6

[6]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) HTML colour codes and Media Access Control (MAC) addresses are two examples of where
hexadecimal is used in Computer Science.

Give two other examples of where hexadecimal can be used in Computer Science.

Example 1 .................................................................................................................................

Example 2 .................................................................................................................................
[2]

© UCLES 2022 0478/12/M/J/22 [Turn over


4

(c) Websites can be created using HTML structure and presentation.

State what is meant by HTML structure and presentation.

Give an example of each in your answer.

Structure ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Presentation .............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(d) Explain why presentation is often separated from structure when creating a web page.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2022 0478/12/M/J/22


5

3 Joelle is a student who uses the Internet.

(a) The table contains five terms or definitions that relate to the Internet.

Complete the table by writing each missing term or definition.

Term Definition

........................................................................................

browser ........................................................................................

........................................................................................

this is the company that provides a user with a


...................................................
connection to the Internet

this is a protocol that is used to send data for web


...................................................
pages across the Internet

........................................................................................

Uniform Resource Locator (URL) ........................................................................................

........................................................................................

........................................................................................

cookie ........................................................................................

........................................................................................

[5]

© UCLES 2022 0478/12/M/J/22 [Turn over


6

(b) Joelle uses a firewall to keep her data safe when she uses the Internet.

Tick (3) to show which statement about firewalls is true.

Tick (3)

Firewalls can only be hardware‑based

Firewalls can only be software‑based

Firewalls can be hardware‑based or software‑based


[1]

(c) Joelle’s parent also uses the firewall to limit the websites that Joelle can access.

Explain how the firewall is used to limit the websites that Joelle can access.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2022 0478/12/M/J/22


7

4 Jason is a programmer who writes computer programs in a high‑level language.

(a) Describe what is meant by a high‑level language.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Jason wants to distribute a computer program he has written. He is considering distributing it
to users as freeware or free software.

(i) Explain one drawback to a user if the program is distributed as freeware.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Explain one benefit to a user if the program is distributed as free software.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2022 0478/12/M/J/22 [Turn over


8

5 Consider the following logic statement:

X = ((A OR B) AND (NOT (B XOR C)) AND C)

(a) Draw a logic circuit to represent the given logic statement.

Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.

B X

[5]

© UCLES 2022 0478/12/M/J/22


9

(b) Complete the truth table for the given logic statement.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

6 Millions of emails are sent between users on a daily basis.

(a) Identify two online security attacks that can be carried out using email.

Describe how email is used to enable the attack.

Online security attack 1 ............................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Online security attack 2 ............................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2022 0478/12/M/J/22 [Turn over


10

(b) Online security attacks can maliciously damage data.

One security method to keep data safe from online attacks is a firewall.

Identify two other security methods that keep data safe from online attacks.

Security method 1 .....................................................................................................................

Security method 2 .....................................................................................................................


[2]

(c) Data can also be damaged accidentally.

One example of how data can be damaged accidentally is by shutting down a computer
before saving data. To prevent this from happening, a user should make sure they have
saved all data before shutting down a computer.

Complete the table by giving three other examples of how data can be damaged accidentally.

Give a method of prevention for each example.

Example Method of prevention

...................................................................... ......................................................................

...................................................................... ......................................................................

...................................................................... ......................................................................

......................................................................

...................................................................... ......................................................................

...................................................................... ......................................................................

...................................................................... ......................................................................

......................................................................

...................................................................... ......................................................................

...................................................................... ......................................................................

...................................................................... ......................................................................

......................................................................

[6]

© UCLES 2022 0478/12/M/J/22


11

7 Cassie stores data for her business every day. She stores the data using optical data storage.

(a) Identify three examples of optical data storage.

Example 1 .................................................................................................................................

Example 2 .................................................................................................................................

Example 3 .................................................................................................................................
[3]

(b) Six statements are given about the operation of three different types of storage.

Tick (3) to show which statements apply to each type of storage. Some statements may
apply to more than one type of storage.

Type of storage
Magnetic Optical Solid state
Statement
(3) (3) (3)

this storage has no moving parts

this storage uses a laser to read and write data

this storage uses a read/write head

this storage burns pits onto a reflective surface

this storage uses NAND and NOR technology

this storage stores data in tracks and sectors

[6]

© UCLES 2022 0478/12/M/J/22 [Turn over


12

8 Sam develops a software application. He distributes a version of the software as shareware.

(a) Describe what is meant by shareware.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Identify three ethical issues that may need to be considered when developing and distributing
software.

Ethical issue 1 ..........................................................................................................................

Ethical issue 2 ..........................................................................................................................

Ethical issue 3 ..........................................................................................................................


[3]

Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 0478/12/M/J/22


Cambridge IGCSE™
* 3 5 3 6 2 6 2 7 9 2 *

COMPUTER SCIENCE 0478/13


Paper 1 Theory May/June 2022

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (CJ) 303905/4
© UCLES 2022 [Turn over
2

1 (a) The table lists five devices.

Tick (3) to show if each device is an example of an input device, an output device or a
storage device.

Input Output Storage


Device
(3) (3) (3)

keyboard

microphone

headphones

hard disk drive (HDD)

actuator
[5]

(b) There are three different types of storage device. One type is magnetic.

State the other two types of storage device.

Type 1 .......................................................................................................................................

Type 2 .......................................................................................................................................
[2]

© UCLES 2022 0478/13/M/J/22


3

2 An aeroplane has a small display screen above each seat, to display the seat number.

(a) The seat number is a hexadecimal value. A 12-bit binary register is used to store the data to
display each seat number.

Three seat numbers, 05A, 18C and 29F, are allocated to passengers.

Give the 12-bit binary value that would be stored for each hexadecimal seat number.

05A ...........................................................................................................................................

18C ...........................................................................................................................................

29F ...........................................................................................................................................
[6]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) The display screen used above each seat is a Light-Emitting Diode (LED) display screen.

Give two reasons why an LED display screen has been used.

Reason 1 ..................................................................................................................................

...................................................................................................................................................

Reason 2 ..................................................................................................................................

...................................................................................................................................................
[2]

(c) Two of the registers store the values 010000001101 and 000001111110

Give the hexadecimal seat number that would be displayed on the screen for each of these
binary values.

010000001101 ....................................................................................

000001111110 ....................................................................................
[4]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2022 0478/13/M/J/22 [Turn over


4

3 AND, OR and XOR are three examples of logic gates.

(a) Four statements are given about these logic gates.

Tick (3) to show which statements apply to each logic gate. Some statements may apply to
more than one logic gate.

AND OR XOR
Statement
(3) (3) (3)

if both inputs are 0, the output is 0

if both inputs are different, the output is 1

if both inputs are 1, the output is 1

if both inputs are the same, the output is always 0

[4]

(b) NOT, AND, OR and XOR are all examples of logic gates.

State the name of two other logic gates and complete a truth table for each.

Logic gate 1 ............................................................ Truth table:

A B Output

0 0

0 1

1 0

1 1

Logic gate 2 ............................................................ Truth table:

A B Output

0 0

0 1

1 0

1 1
[4]

© UCLES 2022 0478/13/M/J/22


5

4 Freddie types a Uniform Resource Locator (URL) into the address bar of his browser.

(a) A URL is a text-based version of a website address. It is made up of several different parts.

State the names of three different parts of a URL.

Part 1 ........................................................................................................................................

Part 2 ........................................................................................................................................

Part 3 ........................................................................................................................................
[3]

(b) Explain how the URL is converted into an Internet Protocol (IP) address for the website.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) A protocol is used to securely transmit the data for the website to the browser.

(i) State the name of this protocol.

..................................................................................................................................... [1]

(ii) Identify how this protocol changes the data to transmit the data securely.

..................................................................................................................................... [1]

© UCLES 2022 0478/13/M/J/22 [Turn over


6

5 Harriet has a computer that is based on a Von Neumann model for a computer system.

The computer has a central processing unit (CPU).

(a) Explain the purpose of the CPU.

Identify the three stages of the cycle performed by the CPU in your answer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

(b) The memory address register (MAR) is one component built into the CPU.

(i) Identify four other components that are built into the CPU.

Component 1 .....................................................................................................................

Component 2 .....................................................................................................................

Component 3 .....................................................................................................................

Component 4 .....................................................................................................................
[4]

(ii) Describe the purpose of the MAR in the CPU.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2022 0478/13/M/J/22


7

(c) Harriet’s computer has both primary and secondary storage.

(i) Explain what is meant by primary storage.

Give three examples of what is stored in primary storage in your answer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [7]

(ii) The secondary storage in Harriet’s computer is damaged, so it is removed for repair.
This means the computer will no longer work.

Explain why the secondary storage is needed for the computer to work.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2022 0478/13/M/J/22 [Turn over


8

6 Frida has a JPEG file stored on her computer.

(a) Tick (3) to show which type of data is stored in a JPEG file.

Tick (3)

Video

Sound

Image

[1]

(b) Compression can be used to reduce the size of a file.

Tick (3) to show whether the JPEG file is a lossy compressed file or a lossless compressed
file or not a compressed file.

Tick (3)

Lossy compressed file

Lossless compressed file

Not a compressed file

[1]

(c) Frida scans a text document into her computer so that she can store a digital version. She
uses a 2D scanner to do this.

Describe how the text document is scanned by the 2D scanner to create the digital version.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2022 0478/13/M/J/22


9

(d) Frida compresses the document for storage.

The compression algorithm she uses recognises repeating patterns in the data and indexes
these patterns. No data is permanently removed.

Identify the type of compression Frida has used.

............................................................................................................................................. [1]

© UCLES 2022 0478/13/M/J/22 [Turn over


10

7 Umar is a manager in an office. The data that he uses on a daily basis is stored on a file server
close to his computer.

Data is sent from his computer to the file server using parallel simplex data transmission.

(a) Describe how the data is sent using parallel simplex data transmission.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) The file server is moved to another building that is 1 km away.

Explain why the parallel simplex data transmission method that Umar uses is no longer
suitable.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) Checksum and Automatic Repeat reQuest (ARQ) are both used when transmitting the data
from a computer to the file server.

Explain why checksum and ARQ are both used.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2022 0478/13/M/J/22


11

8 The paragraph provides information about translators.

Complete the paragraph using the most appropriate terms from the list. Not all terms in the list
need to be used.

• all at once
• assembler
• assembly language
• binary
• commenting
• compiling
• debugging
• executable file
• high-level language
• interpreted
• is not required
• is required
• line by line
• low-level language

A compiler and an interpreter translate ...................................................................... into machine

code. An interpreter does this by translating and executing the code

...................................................................... and a compiler does this by translating and executing

the code ...................................................................... .

One benefit of a compiler is that it creates an ...................................................................... , which

means that a translator ...................................................................... each time to run the file.

...................................................................... is easier to do with an interpreter because it stops

translating and reports an error at the place where it occurs in the code.
[6]

© UCLES 2022 0478/13/M/J/22


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 0478/13/M/J/22


Cambridge IGCSE™
* 8 4 5 6 7 7 9 7 4 9 *

COMPUTER SCIENCE 0478/11


Paper 1 Computer Systems May/June 2023

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (EF) 313965/2
© UCLES 2023 [Turn over
2

1 Binary is a number system used by computers.

(a) Tick (3) one box to show which statement about the binary number system is correct.

A It is a base 1 system

B It is a base 2 system

C It is a base 10 system

D It is a base 16 system
[1]

(b) Denary numbers are converted to binary numbers to be processed by a computer.

Convert these three denary numbers to 8‑bit binary numbers.

50 ..............................................................................................................................................

102 ............................................................................................................................................

221 ............................................................................................................................................
[3]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2023 0478/11/M/J/23


3

(c) Binary numbers are stored in registers.

Negative denary numbers can be represented as binary using two’s complement.

Complete the binary register for the denary number –78

You must show all your working.

Working space ..........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Register:

[2]

(d) Two 8‑bit binary numbers are given.

Add the two 8‑bit binary numbers using binary addition.

Give your answer in binary. Show all your working.

00110011
+01100001

[3]

(e) Two binary numbers are added by a computer and an overflow error occurs.

Explain why the overflow error occurred.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/11/M/J/23 [Turn over


4

2 A student has a sound file that is too large to be stored on their external secondary storage device.
The student compresses the sound file to make the file size smaller.

The compression method used reduces the sample rate and the sample resolution of the sound
file.

(a) State what is meant by the sample rate and sample resolution.

Sample rate ..............................................................................................................................

...................................................................................................................................................

Sample resolution .....................................................................................................................

...................................................................................................................................................
[2]

(b) Identify which type of compression has been used to compress the sound file.

...................................................................................................................................................

............................................................................................................................................. [1]

(c) The student sends the sound file to a friend. The file is transmitted across a network that uses
packet switching.

(i) Identify two pieces of data that would be included in the header of each packet.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(ii) Explain how the file is transmitted using packet switching.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

© UCLES 2023 0478/11/M/J/23


5

3 Secondary storage devices are used to store data in a computer.

(a) Circle three components that are secondary storage devices.

central processing unit (CPU) compact disk (CD)

hard disk drive (HDD) random access memory (RAM) read only memory (ROM)

register sensor solid‑state drive (SSD)

[3]

(b) Tick (3) one box to show which statement about secondary storage is correct.

A It is directly accessed by the CPU.

B It is magnetic storage only.

C It is used to permanently store software and data files.

D It is volatile.
[1]

4 Complete the statements about different types of software.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

application assembly language bootloader central processing unit (CPU)

firmware hardware operating output system user

........................................................................ software provides the services that the computer

requires; an example is utility software.

........................................................................ software is run on the operating system.

The ........................................................................ system is run on the firmware, which is run on

the ........................................................................ .
[4]

© UCLES 2023 0478/11/M/J/23 [Turn over


6

5 A farm has an automated drinking system for its animals. The drinking system has a water bowl
that contains the water. When the water bowl is empty, it is automatically refilled.

The system uses a sensor and a microprocessor.

(a) Identify the most appropriate sensor for this system.

............................................................................................................................................. [1]

(b) Describe how the sensor and the microprocessor are used to automatically refill the water
bowl.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2023 0478/11/M/J/23


7

6 A user wants to connect their computer to a network.

(a) (i) Identify the component in the computer that is needed to access a network.

..................................................................................................................................... [1]

(ii) Identify the type of address that is allocated to the component by the manufacturer,
which is used to uniquely identify the device.

..................................................................................................................................... [1]

(b) A dynamic internet protocol (IP) address is allocated to the computer when it is connected to
the network.

(i) Identify the device on the network that can connect multiple devices and automatically
assign them an IP address.

..................................................................................................................................... [1]

(ii) Describe what is meant by a dynamic IP address.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

7 A programmer uses a low‑level language to write a computer program for a vending machine.

(a) Describe what is meant by a low‑level language.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Give two reasons why the programmer would choose to write the computer program in a
low‑level language instead of a high‑level language.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]
© UCLES 2023 0478/11/M/J/23 [Turn over
8

8 A manager at a company is concerned about a brute‑force attack on its employee user accounts.

(a) Describe how a brute‑force attack can be used to gain access to the employee user accounts.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) One possible aim for carrying out a brute‑force attack is to install malware onto the company
network.

(i) State two other aims for carrying out a brute‑force attack to gain access to the employee
user accounts.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(ii) Identify three types of malware that could be installed.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

(c) Give two security solutions that could be used to help prevent a brute‑force attack being
successful.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2023 0478/11/M/J/23


9

9 A company uses robots in its factory to manufacture large pieces of furniture.

(a) One characteristic of a robot is that it is programmable.

State two other characteristics of a robot.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Give two advantages to company employees of using robots to manufacture large pieces of
furniture.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(c) Give one disadvantage to the company’s owners of using robots to manufacture large pieces
of furniture.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2023 0478/11/M/J/23 [Turn over


10

10 A student uses the internet for their schoolwork to research what is meant by pharming.

(a) State the aim of pharming.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Draw and annotate a diagram to represent the process of pharming.

[4]

(c) The student uses a web browser to access data on the internet.

Explain the purpose of the web browser.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/11/M/J/23


11

(d) Storing cookies is one function of the web browser.

Give three other functions of the web browser.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

(e) A student visits a website that uses session cookies, instead of persistent cookies.

Explain the difference between session cookies and persistent cookies.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2023 0478/11/M/J/23


12

BLANK PAGE

Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2023 0478/11/M/J/23


Cambridge IGCSE™
* 8 1 0 7 6 2 2 0 5 5 *

COMPUTER SCIENCE 0478/12


Paper 1 Computer Systems May/June 2023

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (EF) 313966/2
© UCLES 2023 [Turn over
2

1 Output devices are used to output data from a computer.

Circle three devices that are output devices.

actuator digital versatile disk (DVD) keyboard

microphone mouse printer scanner

sensor solid‑state drive (SSD) speaker


[3]

2 Binary numbers can be converted to hexadecimal.

(a) Convert the two binary numbers to hexadecimal.

10010011 ..................................................................................................................................

00001101 ..................................................................................................................................
[4]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) A value is stored as a binary number in a register.

0 1 1 1 1 0 1 0

A logical right shift of three places is performed on the binary number.

(i) Complete the binary register to show its contents after this logical right shift.

[1]

(ii) State one effect this logical shift has on the binary number.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2023 0478/12/M/J/23


3

(c) Give two reasons why a programmer may use hexadecimal to represent binary numbers.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(d) Denary numbers can also be converted to hexadecimal.

Convert the denary number to hexadecimal.

301 ...................................................................................................................................... [2]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2023 0478/12/M/J/23 [Turn over


4

3 When keys are pressed on a keyboard, the text is converted to binary to be processed by the
computer.

(a) Describe how the text is converted to binary to be processed by the computer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Text that is input into a computer can be stored in a text file.

A text file can be compressed using lossless compression.

(i) State what effect this has on the file size.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Describe how lossless compression compresses the text file.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(iii) Give two reasons why the text file may have been compressed.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2023 0478/12/M/J/23


5

4 A student uses a mobile phone to take photographs for a school project.

The student needs to transmit the photographs to their computer. They could use serial data
transmission or parallel data transmission to transmit the photographs.

(a) (i) Describe how the photographs would be transmitted using serial data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Give two benefits of transmitting the photographs using serial data transmission.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(iii) State one benefit of the student using parallel data transmission instead of serial data
transmission.

...........................................................................................................................................

..................................................................................................................................... [1]

(b) The photographs are also transmitted across a network to cloud storage. A device on the
network forwards the data towards its correct destination.

(i) State the name of this device.

..................................................................................................................................... [1]

(ii) Describe what is meant by cloud storage.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) Give one disadvantage of storing the photographs in cloud storage instead of storing
them locally.

...........................................................................................................................................

..................................................................................................................................... [1]
© UCLES 2023 0478/12/M/J/23 [Turn over
6

5 A programmer writes a computer program using a high‑level language.

(a) Tick (3) one box to show which statement is correct about writing computer programs in a
high‑level language.

A Mnemonics are used to create instructions.

B The computer program is harder to debug than a low‑level language program.

C The computer program is machine independent.

D The hardware of the computer can be directly manipulated.


[1]

(b) The programmer uses a compiler to translate the computer program.

(i) Describe how the compiler translates the computer program.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) Describe how the compiler reports errors.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(c) The programmer uses an integrated development environment (IDE) to create the computer
program.

One function of the IDE is that it has the built‑in compiler.

Give three other common functions of an IDE.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2023 0478/12/M/J/23


7

6 (a) Complete the statements about cookies.

Use the terms from the list.

Some of the terms in the list will not be used. Some terms may be used more than once.

compression executable hypertext markup language (HTML)

hypertext transfer protocol (HTTP) image internet protocol (IP) address

persistent session sound text

uniform resource locater (URL) web browser web server

Cookies are small ........................................................... files that are sent between a

........................................................... and a ........................................................... .

........................................................... cookies are stored in memory and not in the user’s

secondary storage.

When the web browser is closed a ........................................................... cookie is lost,

whereas a ........................................................... cookie is not lost.


[6]

(b) Give three functions of a cookie.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2023 0478/12/M/J/23 [Turn over


8

7 A distributed denial of service attack (DDoS) is a cyber security threat.

(a) Draw and annotate a diagram to represent the process of a DDoS.

[6]

© UCLES 2023 0478/12/M/J/23


9

(b) State two aims of carrying out a DDoS attack.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(c) Give two security solutions that can be used to help prevent a DDoS attack being successful.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

8 A computer is connected to a network and assigned an IPv4 address.

(a) Tick (3) one box to show which device would assign the IPv4 address to the computer.

A Domain name server (DNS)

B Network interface card (NIC)

C Router

D Web server
[1]

(b) Describe the characteristics of an IPv4 address.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2023 0478/12/M/J/23 [Turn over


10

9 One component of an expert system is the inference engine.

(a) Identify the three other components in an expert system.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(b) Describe the role of the inference engine in an expert system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/12/M/J/23


11

10 A user has both system software and application software installed on their computer.

(a) Describe the difference between system software and application software.

Give an example of each software in your answer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) State which component in the computer would store both types of software when the power is
turned off.

............................................................................................................................................. [1]

© UCLES 2023 0478/12/M/J/23


12

BLANK PAGE

Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2023 0478/12/M/J/23


Cambridge IGCSE™
* 4 6 2 4 3 2 5 5 3 0 *

COMPUTER SCIENCE 0478/13


Paper 1 Computer Systems May/June 2023

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages.

DC (CJ) 313967/3
© UCLES 2023 [Turn over
2

1 Computers store data as binary. The binary number 10101110 is stored.

(a) Convert the binary number to denary.

............................................................................................................................................. [1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Convert the binary number to hexadecimal.

............................................................................................................................................. [2]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(c) A logical left shift of three places is performed on the binary number.

(i) Give the 8-bit binary number that would be stored after this logical left shift.

..................................................................................................................................... [1]

(ii) Tick (3) one box to show which statement is true about the impact the logical left binary
shift would have on the binary number.

A The least significant bits are lost.

B The most significant bits are lost.

C The number has been divided by six.

D The number stays the same.


[1]

© UCLES 2023 0478/13/M/J/23


3

(d) Add the two 8-bit binary numbers 11101110 and 00110001 using binary addition.

Give your answer in binary. Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(e) The denary number 301 needs to be stored.

Calculate the least number of bits that can be used to store the denary number 301.

............................................................................................................................................. [1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(f) The hexadecimal number A4D needs to be stored.

Calculate the least number of bits that can be used to store the hexadecimal number A4D.

............................................................................................................................................. [1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2023 0478/13/M/J/23 [Turn over


4

2 A library has a self-checkout system that allows customers to register books that they want to
borrow.

The self-checkout system has a central processing unit (CPU).

The CPU has two cores.

(a) State the purpose of a core in the CPU.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) The CPU is replaced with one that has four cores.

Explain the effect this has on the performance of the self-checkout system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) The CPU contains registers and buses.

(i) Describe the role of a register in the CPU.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Identify one bus that can be found in the CPU and explain its purpose in the
fetch–decode–execute cycle.

Bus ....................................................................................................................................

Purpose .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2023 0478/13/M/J/23


5

(d) The self-checkout system allows the user to input their library membership number.

Give two appropriate input devices that would allow the user to do this.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(e) The self-checkout system uses a monitor to display information about the book.

Users who are blind also need to use the self-checkout system.

Give an appropriate output device that would allow a blind user to be given this information.

............................................................................................................................................. [1]

(f) The self-checkout system uses two types of primary storage.

Circle two types of primary storage that would be used in the system.

compact disk (CD) digital versatile disk (DVD)

hard disk drive (HDD) random access memory (RAM)

read only memory (ROM) universal serial bus (USB) flash memory drive
[2]

(g) The self-checkout system is linked to a stock control system that is updated every time a
book is borrowed from the library.

A microprocessor is used in the stock control system to update the stock.

Explain the role of the microprocessor in this system and how it is used to update the stock
when a book is borrowed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2023 0478/13/M/J/23 [Turn over


6

3 Five network terms or definitions are given in the table.

Complete the table by giving the missing term or definition.

Term Definition

.............................................................................................

.............................................................................................
router
.............................................................................................

.............................................................................................

This address is assigned by the network and used to


identify a device on a network.
.............................................................

.............................................................................................

.............................................................................................
network interface card (NIC)
.............................................................................................

.............................................................................................

This address is assigned by the manufacturer and is used


to uniquely identify the device.
.............................................................

This can be hardware or software based and filters traffic


coming into and out of a network.
.............................................................
[5]

© UCLES 2023 0478/13/M/J/23


7

4 A programmer writes a computer program in a high-level language.

(a) Tick (3) one box to show which statement is a benefit of writing a program in a high-level
language, instead of a low-level language.

A The program can directly manipulate the hardware.

B The program is machine independent.

C The program is more memory efficient.

D The program is quicker to execute.


[1]

(b) Translators are used to translate the high-level language so that it can be processed by the
computer.

(i) State what the high-level language is translated into.

..................................................................................................................................... [1]

(ii) One translator converts and executes the code line by line.

Identify which type of translator would do this.

..................................................................................................................................... [1]

(iii) One translator creates an error report displaying all the errors in the code before it can
be executed.

Identify which type of translator would do this.

..................................................................................................................................... [1]

(iv) One translator creates an executable file.

Identify which type of translator would do this.

..................................................................................................................................... [1]

© UCLES 2023 0478/13/M/J/23 [Turn over


8

5 Complete and annotate the diagram to demonstrate how packet switching is used to transmit data
across a network, including the use of routers, from Device A to Device B.

Device A Device B

[4]

6 A student is writing a help guide about how to recognise and avoid the cyber-security threat of
pharming.

(a) Give three appropriate solutions he could include.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2023 0478/13/M/J/23


9

(b) The student also wants to include information in the help guide about the use of social
engineering as a cyber-security threat.

Describe what is meant by social engineering.

Include one example of social engineering in your answer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(c) The student includes information about the security solution of access levels.

Describe what is meant by access levels.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

7 The rule base and the inference engine are two components of an expert system.

(a) Identify the other two components of an expert system.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Describe the role of the rule base in an expert system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/13/M/J/23 [Turn over


10

8 Complete the statements about a distributed denial of service (DDoS) attack.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

anti-virus bot botnet hacker

internet malware secondary storage

spyware web browser web server website

The attacker encourages people to download ...................................................................... onto

their computer. This will turn each computer into a ...................................................................... ,

creating a network called a ...................................................................... .

When the attacker wants the DDoS to take place, repeated requests are simultaneously sent from

the computers to a ...................................................................... . This causes it to crash, meaning

that users can no longer access the ...................................................................... that is stored on

this hardware.
[5]

9 A device can be given an internet protocol (IP) address. This can be an IPv4 or IPv6.

(a) Give one similarity between IPv4 and IPv6.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Describe two differences between IPv4 and IPv6.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2023 0478/13/M/J/23


11

(c) A web page is requested using an IP address.

(i) Identify the system that stores a database of uniform resource locators (URLs) and their
corresponding IP addresses.

..................................................................................................................................... [1]

(ii) Identify the software that sends a request to the IP address to obtain the web page data.

..................................................................................................................................... [1]

10 A computer has pages A, B and C that are stored in RAM. Page D needs to be sent to the RAM
but the RAM is full.

Page B is not needed immediately.

Explain how virtual memory can be used in this scenario.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2023 0478/13/M/J/23 [Turn over


12

11 Software is installed on a computer to manage files, memory and multitasking.

(a) State the name of the software that can do these tasks.

............................................................................................................................................. [1]

(b) Give one task that the software allows the user to do to manage files.

............................................................................................................................................. [1]

(c) Describe what is meant by managing memory.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(d) A signal is sent within the computer to allow multitasking to occur.

State the name of this type of signal.

............................................................................................................................................. [1]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2023 0478/13/M/J/23


Cambridge IGCSE™
* 7 9 3 8 9 3 6 4 4 9 *

COMPUTER SCIENCE 0478/11


Paper 1 Computer Systems May/June 2024

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (CJ) 329154/3
© UCLES 2024 [Turn over
2

1 A student has a portable tablet computer.

(a) Identify two input devices that could be built into the portable tablet computer.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Identify one output device that could be built into the portable tablet computer.

............................................................................................................................................. [1]

(c) Identify one type of storage device that could be built into the portable tablet computer.

............................................................................................................................................. [1]

2 Hypertext markup language (HTML) colour codes can be represented as hexadecimal.

(a) Tick (3) one box to show which statement about the hexadecimal number system is incorrect.

A It uses the values 0 to 9 and A to F.

B It can be used as a shorter representation of binary.

C It is a base 10 system.

D It can be used to represent error codes.


[1]

(b) Denary numbers can be converted to hexadecimal.

Convert the three denary numbers to hexadecimal.

20 ..............................................................................................................................................

32 ..............................................................................................................................................

165 ............................................................................................................................................
[3]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2024 0478/11/M/J/24


3

3 The binary number 10100011 is stored in random access memory (RAM).

A logical left shift of three places is performed on the binary number.

(a) Give the 8-bit binary number that will be stored after the shift has taken place.

............................................................................................................................................. [1]

(b) Tick (3) one box to show which statement about a logical left shift of two places is correct.

A It would divide the binary number by 2.

B It would multiply the binary number by 2.

C It would divide the binary number by 4.

D It would multiply the binary number by 4.


[1]

(c) 10100011 can be stored as a two’s complement integer.

Convert the two’s complement integer 10100011 to denary. Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(d) The binary number is measured as a byte because it has 8 bits.

State how many bytes there are in a kibibyte (KiB).

............................................................................................................................................. [1]

© UCLES 2024 0478/11/M/J/24 [Turn over


4

4 Data packets are transmitted across a network from one computer to another computer.

(a) Describe the structure of a data packet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Packet switching is used to transmit the data packets across the network.

Identify the device that controls which path is taken by each data packet.

............................................................................................................................................. [1]

(c) Serial data transmission is used to transmit the data packets across the network.

Explain why serial data transmission is used to transmit the data packets.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2024 0478/11/M/J/24


5

5 A computer uses both random access memory (RAM) and secondary storage.

(a) State the purpose of secondary storage.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) One type of secondary storage is optical.

Circle three examples of optical storage.

read only memory (ROM) secure digital (SD) card compact disk (CD)

hard disk drive (HDD) digital versatile disk (DVD)

Blu-ray disk universal serial bus (USB) drive solid-state drive (SSD)
[3]

(c) Explain why a computer needs RAM.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(d) The computer processes instructions using the fetch–decode–execute (FDE) cycle.

Draw and annotate a diagram to show the process of the fetch stage of the FDE cycle.

[4]

© UCLES 2024 0478/11/M/J/24 [Turn over


6

6 A computer needs firmware and system software to operate.

(a) State the purpose of firmware.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Give one example of firmware.

............................................................................................................................................. [1]

(c) Give two examples of system software.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

7 Data is encrypted to keep it safe during transmission.

Complete the paragraph about asymmetric encryption.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

asymmetric certificate cipher text

decrypted encrypted parallel key plain text private key

protected public key serial key symmetric

.............................................................. is encrypted into ..............................................................

using a .............................................................. . The encrypted data is then transmitted from the

sender to the receiver. The encrypted data is then decrypted using a

.............................................................. . [4]

© UCLES 2024 0478/11/M/J/24


7

BLANK PAGE

© UCLES 2024 0478/11/M/J/24 [Turn over


8

8 A farmer uses an automated robot to plant seeds in the field.

(a) State what is meant by the robot being automated.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Give three characteristics of a robot.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

(c) The robot plants seeds and stops when it reaches a fence. It then turns and continues planting
seeds. The robot uses sensors and a microprocessor to know when it reaches a fence.

Explain how the robot uses sensors and a microprocessor to know it has reached a fence.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2024 0478/11/M/J/24


9

(d) Give two advantages of the farmer using an automated robot to plant seeds.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(e) Give two disadvantages of the farmer using an automated robot to plant seeds.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(f) The robot is adapted to have machine learning capabilities.

Explain how this will improve the robot.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2024 0478/11/M/J/24 [Turn over


10

9 A company owner has installed a new network. Data is correct before it is transmitted across the
network.

The company owner is concerned that data might have errors after transmission.

(a) Explain how the data might have errors after transmission.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) The company owner decides to introduce an error detection system to check the data for
errors after transmission.

The error detection system uses an odd parity check and a positive automatic repeat query
(ARQ).

(i) Describe how the error detection system operates to check for errors.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [8]
© UCLES 2024 0478/11/M/J/24
11

(ii) Give two other error detection methods that could be used.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(c) The company owner also installs a firewall to help protect the network from hackers and
malware.

(i) Explain how the firewall operates to help protect the network.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

(ii) Give two examples of malware that the firewall can help protect the network from.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

© UCLES 2024 0478/11/M/J/24


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2024 0478/11/M/J/24


* 0019654976301 *

,  ,

Cambridge IGCSE™

¬Wz> 3mG{M¡=ži†VW
¬–™a=¤IzUr†sT€a_‚
¥ eU5Ue5E•U•e¥ •uU
* 8 4 8 6 8 9 2 6 8 8 *

COMPUTER SCIENCE 0478/12


Paper 1 Computer Systems May/June 2024

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (KS) 329152/4
© UCLES 2024 [Turn over
* 0019654976302 *

DO NOT WRITE IN THIS MARGIN


2
,  ,

1 Data can be measured in bits.

(a) Give the name of the data storage measurement that is equal to 8 bits.

............................................................................................................................................. [1]

(b) State how many bits there are in a kibibyte (KiB).

............................................................................................................................................. [1]

(c) Give the name of the data storage measurement that is equal to 1024 gibibytes (GiB).

DO NOT WRITE IN THIS MARGIN


............................................................................................................................................. [1]

(d) A 16-bit colour image has a resolution of 512 pixels wide by 512 pixels high.

Calculate the file size of the image in kibibytes (KiB). Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

...................................................................................................................................................

Answer ......................................................... KiB


[3]

2 Data can be transmitted from one device to another.

(a) Tick (3) one box to show which of the terms is not a method for transmitting data.

DO NOT WRITE IN THIS MARGIN


A serial

B simplex

C parallel

D parity
[1]

(b) Data is broken down into smaller units to be transmitted from one device to another.
DO NOT WRITE IN THIS MARGIN

Give the name of the unit that data is broken down into.

............................................................................................................................................. [1]

ĬÕú¾Ġ³íÇûÍġ½ĞìĈØĎ×
© UCLES 2024 ĬĖěâÀĨ½ĐÞÿôĐĬößęçĂ
ĥÕµÕõµĥÕõÕąÕååĥÕÕÕ
0478/12/M/J/24
* 0019654976303 *
DO NOT WRITE IN THIS MARGIN

3
,  ,

(c) Data is often encrypted when it is transmitted from one device to another.

(i) Explain how data is encrypted using symmetric encryption.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) Give the purpose of encryption.

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

..................................................................................................................................... [1]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

Ĭ×ú¾Ġ³íÇûÍġ½ĞìĆØĎ×
© UCLES 2024 ĬĖĜáÈĢÁĠÛùýÙ°þûę×Ă
ĥÕÅĕµÕąµĥåÕÕåÅąĕÅÕ
0478/12/M/J/24 [Turn over
* 0019654976304 *

DO NOT WRITE IN THIS MARGIN


4
,  ,

3 Binary is a base 2 number system.

(a) Give the name of the number system that is base 16.

............................................................................................................................................. [1]

(b) Three denary numbers are entered into a computer. The computer converts the numbers and
stores them as binary.

(i) Give the binary number that would be stored for each of the denary numbers.

DO NOT WRITE IN THIS MARGIN


10 ......................................................................................................................................

50 ......................................................................................................................................

201 ....................................................................................................................................
[3]

Working space

...........................................................................................................................................

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(ii) Explain why the data is converted to binary by the computer.

...........................................................................................................................................

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................

..................................................................................................................................... [2]

(c) The two binary integers 00110000 and 01100110 are added together.

Add the binary integers using binary addition and show your answer in binary. Show all your
working.

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

ĬÕú¾Ġ³íÇûÍġ½ĞêĈØĐ×
© UCLES 2024 ĬĖĜäÈĬ³ĩà÷ĆÒĎâÙĉßĂ
ĥĥĕĕõÕąĕąąåÕĥÅåĕÕÕ
0478/12/M/J/24
* 0019654976305 *
DO NOT WRITE IN THIS MARGIN

5
,  ,

(d) The denary integer –32 is stored as a two’s complement integer.

Calculate the two’s complement integer that would be stored.

Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

............................................................................................................................................. [2]

4 A student uses both system software and application software on their computer.

(a) Give one example of system software.

............................................................................................................................................. [1]
DO NOT WRITE IN THIS MARGIN

(b) Give two examples of application software.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(c) Describe the difference between system software and application software.

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]
DO NOT WRITE IN THIS MARGIN

Ĭ×ú¾Ġ³íÇûÍġ½ĞêĆØĐ×
© UCLES 2024 ĬĖěãÀЯęÙāûėÊÚýĉÏĂ
ĥĥĥÕµµĥõĕõõÕĥåÅÕÅÕ
0478/12/M/J/24 [Turn over
* 0019654976306 *

DO NOT WRITE IN THIS MARGIN


6
,  ,

5 Instructions are processed by a central processing unit (CPU) in a computer.

(a) Complete the paragraph about fetching an instruction into the CPU to be processed.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

address arithmetic logic unit (ALU) binary control unit (CU)

DO NOT WRITE IN THIS MARGIN


current instruction register (CIR) data denary driver

fetch interrupt memory address register (MAR)

memory data register (MDR) random access memory (RAM)

read only memory (ROM) secondary storage signal

The program counter contains the ………………………………………………………

DO NOT WRITE IN THIS MARGIN


of the next instruction to be processed; this is then sent to the

……………………………………………………… using the address bus. The address is then

sent to the ……………………………………………………… .

Once the address is received, the instruction stored at the location is

sent to the ………………………………………………………, using the

……………………………………………………… bus. The instruction is then

sent to the ……………………………………………………… that is built into the

DO NOT WRITE IN THIS MARGIN


……………………………………………………… .
[7]

(b) The CPU uses an instruction set to decode the instruction.

State what is meant by an instruction set.

...................................................................................................................................................

............................................................................................................................................. [1]
DO NOT WRITE IN THIS MARGIN

ĬÙú¾Ġ³íÇûÍġ½ĞëĆÕĎ×
© UCLES 2024 ĬĖĜãÃĨ×ēÑĆĊĞêâĠáßĂ
ĥµÅÕµĕĥÕÕĕÕÕååĥĕĕÕ
0478/12/M/J/24
* 0019654976407 *
DO NOT WRITE IN THIS MARGIN

7
,  ,

6 The table contains statements about error detection methods.

Complete the table by giving the correct error detection method for each statement.

error detection method statement

…………………………………………… An odd or even process can be used.

A value is calculated from the data, using an


…………………………………………… algorithm. This happens before and after the data
DO NOT WRITE IN THIS MARGIN

is transmitted.

A copy of the data is sent back to the sender by


……………………………………………
the receiver.

…………………………………………… Acknowledgement and timeout are used.

A value is appended to data that has been


…………………………………………… calculated using the data. This value is checked
on data entry.
[5]
DO NOT WRITE IN THIS MARGIN

7 A computer has both a media access control (MAC) address and an internet protocol (IP) address.

(a) Tick (3) one box to show which of the statements is correct about the MAC address.

A It is assigned by the manufacturer.

B It is assigned by a router.

C It can be static or dynamic.


DO NOT WRITE IN THIS MARGIN

D It is made up of three different parts.


[1]

(b) An IP address can have an IPv4 or IPv6 format.

(i) Give an example of an IP address that has an IPv4 format.

..................................................................................................................................... [1]

(ii) Give two characteristics of the IPv6 format.

1 ........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]
ĬÛù¿Ġ³íÇûÍġ½ĞìĆÕĎ×
© UCLES 2024 ĬĖĜáÀīèõâćöÙđĢĠđ×Ă
ĥąĥĕµµÅµµĕõÕĥĥĥÕåÕ
0478/12/M/J/24 [Turn over
* 0019654976408 *

DO NOT WRITE IN THIS MARGIN


8
,   ,

8 A company has a website that is suffering a distributed denial of service (DDoS) attack.

(a) Draw and annotate a diagram to show the process of the DDoS.

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN
[5]

(b) Identify a solution that can be used to help prevent the DDoS attack being successful.

............................................................................................................................................. [1]

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN

ĬÙù¿Ġ³íÇûÍġ½ĞêĈÕĐ×
© UCLES 2024 ĬĖĜäÀġÖôÕĉíÒ³¾¾āßĂ
ĥµµĕõµÅĕÕµąÕåĥÅÕµÕ
0478/12/M/J/24
* 0019654976409 *
DO NOT WRITE IN THIS MARGIN

9
,   ,

9 A company uses both solid-state and optical secondary storage.

(a) Explain why a computer needs secondary storage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]
DO NOT WRITE IN THIS MARGIN

(b) Describe three differences between solid-state and optical storage.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................
[6]
DO NOT WRITE IN THIS MARGIN

ĬÛù¿Ġ³íÇûÍġ½ĞêĆÕĐ×
© UCLES 2024 ĬĖěãÈħÚĄäïĄėħ¶ĚāÏĂ
ĥµÅÕµÕåõÅÅÕÕåąåĕåÕ
0478/12/M/J/24 [Turn over
* 0019654976410 *

DO NOT WRITE IN THIS MARGIN


10
,  ,

10 A garage uses an expert system to help diagnose any problems with cars that need repair.

(a) The expert system is an example of artificial intelligence (AI).

Describe what is meant by AI.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


............................................................................................................................................. [2]

(b) A car has a problem with its braking system, so it is brought into the garage.

Explain how the expert system operates and how it is used to help diagnose the problem.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


............................................................................................................................................. [5]

DO NOT WRITE IN THIS MARGIN

ĬÙù¿Ġ³íÇûÍġ½ĞëĈ×Ď×
© UCLES 2024 ĬĖęäÅģÎĦÛĂöüÏÀê¹×Ă
ĥĥÕÕõµĥĕõąąĕåÅÅÕąÕ
0478/12/M/J/24
* 0019654976411 *
DO NOT WRITE IN THIS MARGIN

11
,  ,

11 A company has a website. Users use the internet and the world wide web to access the website.

(a) Describe the difference between the internet and the world wide web.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]
DO NOT WRITE IN THIS MARGIN

(b) The website has a uniform resource locator (URL). The URL has three different parts.

Identify the three different parts that are included in the URL.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]
DO NOT WRITE IN THIS MARGIN

(c) One function of a web browser is to provide an address bar for a user to enter a URL.

Give three other functions of a web browser.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

ĬÛù¿Ġ³íÇûÍġ½ĞëĆ×Ď×
© UCLES 2024 ĬĖĚã½ĥÒĖÞøċ­ċ¸î¹çĂ
ĥĥåĕµÕąõĥõÕĕåååĕĕÕ
0478/12/M/J/24
* 0019654976412 *

DO NOT WRITE IN THIS MARGIN


12
,  ,

BLANK PAGE

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
ĬÙù¿Ġ³íÇûÍġ½ĞéĈ×Đ×
© UCLES 2024 ĬĖĚâ½ğäēÙúĄ¶éĜÐéÏĂ
ĥÕõĕõÕąÕąÕåĕĥåąĕąÕ
0478/12/M/J/24
Cambridge IGCSE™
* 2 0 8 1 7 4 3 8 5 1 *

COMPUTER SCIENCE 0478/13


Paper 1 Computer Systems May/June 2024

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (CE) 329144/3
© UCLES 2024 [Turn over
2

1 The size of a file can be measured in different units.

(a) State how many bits there are in a byte.

............................................................................................................................................. [1]

(b) State how many kibibytes (KiB) there are in 2 mebibytes (MiB).

............................................................................................................................................. [1]

(c) Identify the unit of data that is equal to 4 bits.

............................................................................................................................................. [1]

2 An image has a 16-bit colour depth and a resolution of 1000 × 1750 pixels.

(a) State what is meant by a 16-bit colour depth.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) The resolution of the image is changed to 750 × 1500 pixels.

Give the effect this will have on the file size of the image.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2024 0478/13/M/J/24


3

3 A programmer is creating a computer game. One character is not moving correctly.

The programmer needs to debug the program. To do this they need to look at addresses that are
locations in memory.

The addresses are displayed as hexadecimal numbers.

(a) One address is A2F.

(i) Convert the address to binary.

..................................................................................................................................... [3]

(ii) Convert the address to denary.

..................................................................................................................................... [1]

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(b) The binary number stored for another address is 000110011011.

(i) Convert the binary number to hexadecimal.

..................................................................................................................................... [3]

(ii) Convert the binary number to denary.

..................................................................................................................................... [1]

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(c) Give one reason why the addresses are displayed in hexadecimal instead of binary.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2024 0478/13/M/J/24 [Turn over


4

(d) Identify two other ways that hexadecimal is used in computer science.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(e) The health value for a character in the computer game can sometimes be a negative value.
The negative values are stored as two’s complement 8-bit integers.

A character has a health value of –25.

Calculate the two’s complement 8-bit integer for –25. Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

4 The table contains statements about types of secondary storage.

Complete the table by writing the correct type of secondary storage for each statement.

type of secondary storage statement

................................................. Pits and lands are created on a reflective surface.

................................................. NAND or NOR technology is used.

................................................. Platters are spun that are divided into tracks and sectors.

................................................. Electromagnets are used to read and write data.

................................................. Transistors are used as control gates and floating gates.

................................................. A red or blue laser is used to read and write data.

[6]

© UCLES 2024 0478/13/M/J/24


5

5 A computer uses both random access memory (RAM) and read only memory (ROM).

(a) Tick (3) one box to show which statement is correct about RAM.

A It is non-volatile storage.

B It stores the bootloader.

C It stores data that is currently in use.

D It is not directly accessible by the central processing unit (CPU).


[1]

(b) ROM is a type of primary storage.

State the characteristic of ROM that makes it a type of primary storage.

...................................................................................................................................................

............................................................................................................................................. [1]

6 A sensor is an input device that is used to capture data from its surrounding environment.

(a) Circle three other input devices.

touch screen hard disk drive (HDD) headphones

speaker microphone actuator

universal serial bus (USB) drive printer keyboard


[3]

(b) Sensors can be used in an automated system.

Give two benefits of using sensors in this type of system.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2024 0478/13/M/J/24 [Turn over


6

(c) The table contains different types of sensors and a use for each.

Complete the table by giving a suitable use for each type of sensor. The first one has been
done for you.

type of sensor use

to monitor whether a water pipe has cracked and is leaking and dripping
acoustic
onto the floor

................................................................................................................
temperature
................................................................................................................

................................................................................................................

................................................................................................................
humidity
................................................................................................................

................................................................................................................

................................................................................................................
infra-red
................................................................................................................

................................................................................................................

................................................................................................................
magnetic field
................................................................................................................

................................................................................................................
[4]

© UCLES 2024 0478/13/M/J/24


7

7 A company has a network that includes a web server.

Data is transmitted across the network using serial half-duplex data transmission.

(a) Draw and annotate a diagram to show how the data is transmitted using serial half-duplex
data transmission.

[4]

(b) Give two benefits of the company using serial half-duplex data transmission for this purpose.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(c) Give one drawback of the company using serial half-duplex data transmission for this
purpose.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2024 0478/13/M/J/24 [Turn over


8

(d) The company uses a proxy server to help protect the web server and the network from cyber
security threats.

(i) Give three cyber security threats that the proxy server can help protect against.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

(ii) Identify two functions of the proxy server that can be used to help protect the web server
and the network.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(e) Customers access the company’s web pages that are stored on the web server.

Describe how the web pages are located, retrieved and displayed on a customer’s computer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2024 0478/13/M/J/24


9

8 A student has a computer that has a central processing unit (CPU).

(a) Describe the role of the CPU in the computer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) The CPU contains registers.

(i) State the purpose of a register.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Give three registers that are built into the CPU.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

(c) One component in the CPU is the arithmetic logic unit (ALU).

Describe the purpose of the ALU.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2024 0478/13/M/J/24 [Turn over


10

(d) The student wants to replace the CPU to increase the performance of the computer.

Explain why a different CPU can increase the performance.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2024 0478/13/M/J/24


11

9 A printer runs out of ink and needs a new ink cartridge. An interrupt is sent and a message is
generated to notify the user that the ink cartridge is empty.

(a) Complete the paragraph about the use of an interrupt in this process.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

binary clock computer data error

fetch–decode–execute cycle hexadecimal higher interrupt queue

interrupt service routine (ISR) lower printer priority level

secondary storage sorting transmission

The ...................................................................... sends an interrupt to the

...................................................................... . The interrupt is given a

...................................................................... . The processor completes its current

...................................................................... and checks the

...................................................................... to see if there is an interrupt with

...................................................................... priority than the current task. If there is, it stores

the current task and fetches the interrupt. It then calls the

...................................................................... , which is a sequence of instructions that

handles the interrupt. The interrupt is handled, which generates a message to the user to

notify them that the ink cartridge is empty.


[7]

(b) Handling interrupts is one function of an operating system.

Give two functions of an operating system that relate to memory.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

© UCLES 2024 0478/13/M/J/24


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2024 0478/13/M/J/24


Cambridge IGCSE™
* 0 8 0 3 7 2 8 9 4 0 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory February/March 2021

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (PQ/SG) 202679/4
© UCLES 2021 [Turn over
2

1 A hockey club records the number of people that watch each match. An 8-bit binary register is
used to store this value.

(a) 46 people watch the first match and 171 people watch the second match.

Show how the registers would store these denary values as 8-bit binary.

Denary
8-bit binary
value
46

171
[2]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Give the largest denary value that can be stored in the 8-bit binary register.

............................................................................................................................................. [1]

(c) The hockey club wants to increase the number of people that can watch each match to 2000.
The 8-bit binary register may no longer be able to store the value.

Give the smallest number of bits that can be used to store the denary value 2000.

............................................................................................................................................. [1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2021 0478/12/F/M/21


3

(d) Electronic data about the final score for the match is transmitted to a central computer
30 kilometres away, using serial transmission.

(i) Explain why serial transmission is more appropriate than parallel transmission in this
scenario.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) The data transmission is also half-duplex.

Describe half-duplex data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) The data transmission uses checksums.

Describe how checksums are used to detect errors in data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

© UCLES 2021 0478/12/F/M/21 [Turn over


4

2 Gurdeep takes high definition photographs using a digital camera. She has set up a website where
users can view thumbnails of her photographs. A thumbnail is a small version of the high definition
photograph.

(a) Gurdeep compresses the high definition photographs to create the thumbnails. She uses
lossy compression.

Describe how lossy compression creates the thumbnails.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Gurdeep sets up a web server to host her website. She reads about an Internet Protocol (IP)
address, a Media Access Control (MAC) address and a Uniform Resource Locator (URL).

Draw a line to connect each term to the correct example.

Term Example

IP address 192.168.0.255

MAC address https://www.cambridgeinternational.org

URL 00:15:E9:2B:99:3C

[2]

© UCLES 2021 0478/12/F/M/21


5

(c) Users can buy the high definition photographs from the website. When a user buys a high
definition photograph, a Secure Socket Layer (SSL) connection is created.

(i) Give one benefit of using an SSL connection.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Explain how the SSL connection is created.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2021 0478/12/F/M/21 [Turn over


6

3 The given table shows the name or description of four devices. The table is incomplete.

Complete the missing device names and descriptions.

Device name Description

................................................... Uses either thermal bubble or piezoelectric technology

...............................................................................................

...............................................................................................
Actuator
...............................................................................................

...............................................................................................

Uses thousands of tiny mirrors that can move very quickly to


...................................................
create an image

...............................................................................................

...............................................................................................
Mouse
...............................................................................................

...............................................................................................
[4]

© UCLES 2021 0478/12/F/M/21


7

4 A supermarket sells many products. Each product has a barcode.

(a) Explain how the barcode is read at the supermarket checkout and how the price of the product
is found.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

(b) The supermarket stores data using a Solid State Drive (SSD).

(i) Explain how an SSD stores data.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) One advantage of an SSD rather than a Hard Disk Drive (HDD) is that it has no moving
parts, so it is more durable.

State one other advantage of the supermarket using SSD rather than HDD.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2021 0478/12/F/M/21 [Turn over


8

5 Computers use logic gates.

(a) State the single logic gate that produces each truth table.

Truth table Logic gate

A B Output

0 0 1

0 1 1 ...................................................................................
1 0 1

1 1 0

A B Output

0 0 0

0 1 1 ...................................................................................
1 0 1

1 1 0

A B Output

0 0 1

0 1 0 ...................................................................................
1 0 0

1 1 0

[3]

(b) An aeroplane has a warning system that monitors the height of the aeroplane above the
ground, whether the aeroplane is ascending or descending, and the speed of the aeroplane.

Input Binary value Condition

Height 1 Height is less than 500 metres


(H) 0 Height is greater than or equal to 500 metres
Ascending or 1 Aeroplane is ascending or in level flight
Descending
(A) 0 Aeroplane is descending

Speed 1 Speed is less than or equal to 470 knots


(S) 0 Speed is greater than 470 knots

© UCLES 2021 0478/12/F/M/21


9

The warning system will produce an output of 1 that will sound an alarm (W) when either of
these conditions apply:

Height is less than 500 metres and the aeroplane is descending

or

The aeroplane is descending and speed is greater than 470 knots

Draw a logic circuit to represent the warning system.

A W

[5]

© UCLES 2021 0478/12/F/M/21 [Turn over


10

6 Hacking is one type of Internet risk used to obtain personal data that is stored on a computer.

(a) Explain how a firewall can help prevent hacking.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Identify and describe two other types of internet risk that are used to obtain personal data.

Internet risk 1 ............................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Internet risk 2 ............................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2021 0478/12/F/M/21


11

7 Adeel has used a high-level language to program a mobile application.

(a) Describe what is meant by a high-level language.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Adeel uses an interpreter while developing and testing the application.

Adeel uses a compiler when the application is ready to be shared with others.

Compare the features of interpreters and compilers.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(c) Adeel is considering distributing his application as free software or shareware.

Explain the difference between free software and shareware.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]
© UCLES 2021 0478/12/F/M/21 [Turn over
12

(d) Adeel is concerned about his application being plagiarised.

Define the term plagiarism.

...................................................................................................................................................

............................................................................................................................................. [1]

(e) Adeel copyrights his application.

State why Adeel copyrights his application.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2021 0478/12/F/M/21


13

8 The Von Neumann model, for a computer system, uses the stored program concept.

(a) Describe what is meant by the stored program concept.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) The fetch-execute cycle of a Von Neumann model, for a computer system, uses registers and
buses.

(i) Describe the role of the Program Counter.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Describe the role of the Control Bus.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(c) Computers based on the Von Neumann model, for a computer system, use interrupts.

Explain why interrupts are needed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2021 0478/12/F/M/21


14

BLANK PAGE

© UCLES 2021 0478/12/F/M/21


15

BLANK PAGE

© UCLES 2021 0478/12/F/M/21


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 0478/12/F/M/21


Cambridge IGCSE™
* 1 4 2 8 2 4 6 4 9 8 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory February/March 2022

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (LK) 303935/2
© UCLES 2022 [Turn over
2

1 A computer stores data in binary form. Binary numbers can be represented as hexadecimal and
denary numbers.

(a) Convert the 8-bit binary number 01010101 to denary.

............................................................................................................................................. [1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Convert the binary number 11000000 to hexadecimal.

............................................................................................................................................. [1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(c) Convert the hexadecimal number 1A to denary.

............................................................................................................................................. [1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(d) Binary numbers can be stored as bytes.

State how many bits are in two bytes.

............................................................................................................................................. [1]

© UCLES 2022 0478/12/F/M/22


3

2 Nadia creates a digital image for a school project.

(a) Give one example of an image format.

............................................................................................................................................. [1]

(b) Describe how a digital image file is stored by a computer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(c) Nadia compresses the digital image file before emailing it to a friend.

(i) State what is meant by data compression.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Explain why Nadia compresses the digital image file before emailing it.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2022 0478/12/F/M/22 [Turn over


4

(iii) Nadia’s email service uses parity bits as a method of error detection during the
transmission of data.

Describe how the parity bits are used to detect errors.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

(iv) Identify and describe one other method of error detection used during the transmission
of data.

Method ..............................................................................................................................

Description ........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

© UCLES 2022 0478/12/F/M/22


5

3 (a) Tick (3) to show which logic gates will give an output of 1 for the given inputs A and B.

Inputs AND OR NAND NOR XOR


A=1
B=1
A=0
B=0
A=1
B=0
[3]

(b) Draw the logic circuit for the given logic statement:

X = (A XOR B) AND (B OR NOT C)

Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.

B X

[4]

© UCLES 2022 0478/12/F/M/22 [Turn over


6

4 Pradeep uses his personal computer to complete work at home.

(a) Pradeep uses a mouse and a keyboard to control the computer.

(i) Complete the descriptions of the principles of operation of a mouse and a keyboard
using the most appropriate terms from the list. Not all terms in the list need to be used.

• absorbs
• ball
• biometric
• circuit
• colour
• digital
• direction
• Light-Emitting Diode (LED)
• Liquid Crystal Display (LCD)
• reflects
• speed
• switch
• transparency

An optical mouse shines a red light from a ................................................... underneath

the mouse. The light .................................................. back from a surface through a

lens in the mouse and is converted to a value. This value is transmitted to the

computer. The computer then determines the ................................................... and

................................................... of the movement.

When the user presses a key on a keyboard, the key pushes the

................................................... on the circuit board. This completes a

................................................... . Signals are sent to the computer. The computer uses

the data to calculate which key was pressed.


[6]

(ii) Identify two other input devices Pradeep could use with his personal computer.

Input device 1 ....................................................................................................................

Input device 2 ....................................................................................................................


[2]

© UCLES 2022 0478/12/F/M/22


7

(b) Pradeep uses a projector attached to the ceiling at his home to watch high-definition (HD)
films.

The projector has broken. He wants to buy a replacement. He needs to choose between an
LCD projector and a Digital Light Projector (DLP).

Explain why an LCD projector would be more appropriate for Pradeep.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(c) Pradeep stores his collection of films and his work files on his personal computer.

Pradeep wants to save a copy of all his films and files onto a single storage device.

Identify and justify an appropriate storage device to store the copies.

Storage device ..........................................................................................................................

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2022 0478/12/F/M/22 [Turn over


8

5 A holiday company has a website where customers can create accounts and can book and pay for
holidays.

(a) The website is written in Hypertext Markup Language (HTML).

Give two examples of HTML structure and two examples of HTML presentation.

Structure 1 ................................................................................................................................

Structure 2 ................................................................................................................................

Presentation 1 ..........................................................................................................................

Presentation 2 ..........................................................................................................................
[4]

(b) The website is stored on a web server. Customers use their own computers to access the
website.

Uniform Resource Locator (URL), Internet Protocol (IP) and Media Access Control (MAC) are
three types of address used by computers when accessing the Internet.

Give two features of each type of address in the table.

Type of
Features
address

............................................................................................................................

............................................................................................................................
URL
............................................................................................................................

............................................................................................................................

............................................................................................................................

............................................................................................................................
IP
............................................................................................................................

............................................................................................................................

............................................................................................................................

............................................................................................................................
MAC
............................................................................................................................

............................................................................................................................
[6]

© UCLES 2022 0478/12/F/M/22


9

(c) The company is concerned about threats to its web server.

Complete the table by identifying:

• two potential threats to its web server


• the impact each threat could have on the company
• software the company can use to help to limit each threat.

Each impact must be different.

Threat Impact on company Software

.........................................................................
............................ ..................................
.........................................................................
............................ ..................................
.........................................................................

.........................................................................

.........................................................................
............................ ..................................
.........................................................................
............................ ..................................
.........................................................................

.........................................................................
[6]

© UCLES 2022 0478/12/F/M/22 [Turn over


10

6 A business uses a closed-circuit television (CCTV) system that starts recording when motion is
detected. It stops recording after two minutes if no further motion is detected. The system uses a
motion sensor and a microprocessor.

Describe how the motion sensor and microprocessor work together to control the CCTV system.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [7]

© UCLES 2022 0478/12/F/M/22


11

7 Ishani is a software developer who is creating a new computer game.

(a) Ishani uses an interpreter and a compiler at different stages of the game creation.

(i) Explain when it is most appropriate for Ishani to use an interpreter.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) Explain when it is most appropriate for Ishani to use a compiler.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(b) Ishani has to decide between releasing her game as freeware or free software.

Describe freeware and free software.

Freeware ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Free software ............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2022 0478/12/F/M/22


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 0478/12/F/M/22


Cambridge IGCSE™
* 1 8 6 2 2 6 2 8 5 3 *

COMPUTER SCIENCE 0478/12


Paper 1 Computer Systems February/March 2023

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (EF) 313505/3
© UCLES 2023 [Turn over
2

1 Computers can be infected with malware. Spyware is one example of malware.

(a) Tick (✓) one box to show a correct definition of spyware.

A Software that activates a webcam and transmits the video to a third party
that outputs it live on a website.

B Software that detects when a password is being entered and then emails
the password to a third party.

C Software that records all data entered into a computer, analyses this data
to find email addresses and passwords, then posts these to a website.

D Software that records all key presses and transmits these to a third party.

[1]

(b) Complete the table by identifying and describing two other examples of malware.

Malware Description

...........................................................................................................

...........................................................................................................
......................................
1 ...........................................................................................................
......................................
...........................................................................................................

...........................................................................................................

...........................................................................................................

...........................................................................................................
......................................
2 ...........................................................................................................
......................................
...........................................................................................................

...........................................................................................................

[6]

© UCLES 2023 0478/12/F/M/23


3

(c) Proxy‑servers and firewalls have some similar functions.

Identify two similarities and one difference between proxy‑servers and firewalls.

Similarity 1 ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Similarity 2 ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Difference .................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2023 0478/12/F/M/23 [Turn over


4

2 A programmer has designed a three‑dimensional (3D) interactive computer game. They are going
to develop a program for the game. The program needs to run efficiently, but it must also be
developed as soon as possible.

(a) Tick (✓) one box to identify whether the programmer should use a high‑level language or a
low‑level language to develop the program.

Explain the reasons for your choice.

High‑level language

Low‑level language

Reasons for your choice ...........................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) If the programmer chooses a high‑level language, they can use a compiler or an interpreter to
translate the high‑level language into a low‑level language.

Describe the operation of a compiler and of an interpreter.

Compiler ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Interpreter .................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2023 0478/12/F/M/23


5

3 A new computer comes with primary and secondary storage.

(a) Data storage is measured using binary denominations.

Complete each conversion.

8 bytes = .............................. nibbles

512 kibibytes (KiB) = .............................. mebibytes (MiB)

4 gibibytes (GiB) = .............................. mebibytes (MiB)

1 exbibyte (EiB) = .............................. pebibytes (PiB)


[4]
Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Random access memory (RAM) is an example of primary storage.

Give three examples of data that is commonly stored in RAM.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(c) Describe the purpose of secondary storage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/12/F/M/23 [Turn over


6

4 A wildlife photographer stores their digital images on a computer.

(a) Complete the table by defining each term about images.

Image term Definition

...................................................................................................................

pixel ...................................................................................................................

...................................................................................................................

...................................................................................................................

resolution ...................................................................................................................

...................................................................................................................

[2]

(b) One of the images has a resolution of 1000 × 1000 and a colour depth of 2 bytes.

Calculate the file size of the image. Give your answer in bytes.

Show your working.

Working space ..........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

File size ...................................... bytes


[2]

© UCLES 2023 0478/12/F/M/23


7

(c) The photographer decides to purchase a solid‑state storage device to back up their images.

Complete the description of solid‑state storage.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

binary denary electrons grid neutrons

non‑volatile RAM star transistors virtual volatile

Solid‑state storage is ........................................................... . This means that the data is not

lost when the power is turned off.

Solid‑state storage is made of ........................................................... that are laid out in a

........................................................... .

Gates are used to control the flow of the ........................................................... through the

transistors. This changes the data in the transistors from 1 to 0, or from 0 to 1.


[4]

(d) The photographer compresses an image file before it is emailed.

Give one reason why a file is compressed.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2023 0478/12/F/M/23 [Turn over


8

5 A website allows users to purchase items.

Computer A sends a request for the homepage to the website’s server.

(a) The request is sent using packet switching.

The structure of a packet of data has three elements. One element is the packet header.

(i) Identify two items of data contained in a packet header.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(ii) Identify the two other elements of a packet.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

© UCLES 2023 0478/12/F/M/23


9

(b) Computer A needs to be directly connected to a router that is located in a different room.

(i) Tick (✓) one box to identify whether serial data transmission or parallel data transmission
is more suitable for this connection.

Explain the reasons for your choice.

Serial data transmission

Parallel data transmission

Reasons for your choice ...................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) The connection will also use full‑duplex data transmission.

Define full‑duplex data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2023 0478/12/F/M/23 [Turn over


10

(c) The data transmission will use parity checks.

(i) The bytes need to be sent using an even parity byte check.

Complete the parity bit for each byte.

Parity
bit

Byte A 1 1 0 0 0 1 1

Byte B 0 0 0 0 0 0 0

[2]

(ii) A parity block check can be used instead of a parity byte check.

Explain how a parity block check might detect an error in transmission that would not be
detected by a parity byte check.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2023 0478/12/F/M/23


11

(iii) The data was sent using an even parity block check. One of the bits has been transmitted
incorrectly.

Parity
Bit 1 Bit 2 Bit 3 Bit 4 Bit 5 Bit 6 Bit 7
bit

Byte 0 1 1 1 0 1 0 0 0

Byte 1 0 0 1 0 0 1 0 0

Byte 2 1 0 1 1 0 0 0 1

Byte 3 1 1 0 0 1 1 1 1

Byte 4 1 0 1 0 0 0 1 0

Byte 5 0 0 0 0 0 0 0 0

Byte 6 0 1 1 1 1 0 0 0

Parity
0 1 1 0 1 0 1 0
byte

Identify the bit number and the byte number of the incorrect bit.

Bit number ......................................

Byte number ......................................


[2]

© UCLES 2023 0478/12/F/M/23 [Turn over


12

(d) The website allows the user to set up an account to log on and purchase items. The website
is accessed and displayed using a web browser.

(i) Two functions of the web browser are to render hypertext markup language (HTML) to
display web pages and to store cookies.

Identify two other functions of a web browser.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(ii) Identify two ways that cookies can be used to enhance the user’s experience of this
website.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2023 0478/12/F/M/23


13

6 A company is involved in robotics.

One of its robots is designed to make a specific movement depending on a binary value.

(a) The table gives some of the movements for the robot.

Complete the table by writing the missing binary, denary or hexadecimal value for each
movement.

Movement Binary Denary Hexadecimal

forward 1 step 00011111 31

back 1 step 140 8C

turn right 01011010 5A

turn left 120 78

[4]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Describe what is meant by robotics.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/12/F/M/23 [Turn over


14

(c) The robot has a sensor and a microprocessor.

The robot will move forward continuously until it detects an object that is less than or equal to
10 cm in front of it.

If an object is less than or equal to 10 cm in front of it, the robot turns 90 degrees right. It then
tries to move forward again.

Explain how the sensor and the microprocessor are used to automate this robot.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [7]

© UCLES 2023 0478/12/F/M/23


15

(d) The robot needs to find its way through different puzzles. Each puzzle has a series of paths
that the robot needs to follow to find its way to the end of the puzzle. The puzzle contains
dead ends and obstacles, so the robot needs to decide which way to go.

The robot’s program will use artificial intelligence (AI).

(i) Describe the characteristics of AI.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) Explain how the program will use AI.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2023 0478/12/F/M/23


16

BLANK PAGE

Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2023 0478/12/F/M/23


Cambridge IGCSE™
* 5 0 1 5 4 0 7 3 5 7 *

COMPUTER SCIENCE 0478/12


Paper 1 Computer Systems February/March 2024

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (DE) 327909/3
© UCLES 2024 [Turn over
2

1 Computers represent different types of data in binary.

(a) Tick (✓) one box to show the reason why computers use binary to represent data.

A Computers only allow 1s and 0s to be entered.

B Computers are made of switches and gates that can only be on or off.

C Binary does not need to be converted into other forms of data to be displayed.

D Both computers and humans can quickly process binary data.


[1]

(b) One form of data is characters.

The American standard code for information interchange (ASCII) denary number for the
character ‘N’ is 78.

(i) Tick (✓) one box to identify the ASCII denary number for the character ‘Q’.

A 81

B 80

C 79

D 77
[1]

(ii) Give the binary number for the ASCII denary number for ‘N’.

..................................................................................................................................... [1]

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(iii) Explain how the word ‘RED’ is represented using a character set.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]
© UCLES 2024 0478/12/F/M/24
3

(c) Sound can be represented as binary.

(i) Explain why recording sound with a higher sampling resolution creates a more accurate
recording.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Give one other way that the accuracy of a sound recording can be improved.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2024 0478/12/F/M/24 [Turn over


4

2 A computer has a central processing unit (CPU).

The CPU includes the registers:


• Program counter (PC)
• Memory address register (MAR)
• Memory data register (MDR)
• Accumulator (ACC)
• Current instruction register (CIR).

(a) The table contains five statements about the role of registers in the fetch–decode–execute
cycle of a CPU.

Letter Statement
A PC stores the address of the next instruction to be accessed
B MAR stores the instructions of the program that is running
C MDR stores the data passed to it from the PC
D ACC stores the result of each calculation
E CIR stores the instruction currently being executed

Two of the statements are not correct.

Identify the letter of each incorrect statement.

Suggest a corrected statement for each.

Incorrect statement 1 .........................................

Corrected statement .................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Incorrect statement 2 .........................................

Corrected statement .................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(b) The computer has a single core 3.5 GHz processor and an 8 kB cache.

(i) State what is meant by a 3.5 GHz processor.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2024 0478/12/F/M/24


5

(ii) The CPU is changed to a dual-core 3.5 GHz processor.

Explain how the number of cores affects the performance of a CPU.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) The amount of cache is increased to 64 kB.

Explain how the amount of cache affects the performance of a computer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(c) The computer has both primary and secondary storage.

(i) Random access memory (RAM) is one example of primary storage.

Describe what is meant by RAM.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Read only memory (ROM) is another example of primary storage. ROM often stores the
start-up instructions for a computer.

Identify one other item of data that is commonly stored in ROM.

...........................................................................................................................................

..................................................................................................................................... [1]

(iii) Some computers make use of virtual memory.

State the purpose of virtual memory.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2024 0478/12/F/M/24 [Turn over


6

3 A computer has an operating system (OS).

(a) Complete the table by writing each missing OS function name and description.

Function name Description

……………………………………………………………………………

……………………………………………………………………………
managing memory
……………………………………………………………………………

……………………………………………………………………………

……………………................…
allows application software to run on the computer
……………………................…

……………………………………………………………………………

……………………………………………………………………………
managing peripherals
……………………………………………………………………………

……………………………………………………………………………

[3]

(b) The OS handles interrupts.

(i) State the purpose of an interrupt.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Identify one input device and one example of an interrupt that it can generate.

Input device .......................................................................................................................

Interrupt .............................................................................................................................
[1]

© UCLES 2024 0478/12/F/M/24


7

(iii) A processor is currently executing a program. The processor receives an interrupt.

Explain how the processor manages the current program and the interrupt.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

© UCLES 2024 0478/12/F/M/24 [Turn over


8

4 A student enters a uniform resource locator (URL) into their web browser.

Draw and annotate a diagram to show the process from the user entering the URL to the web
browser displaying the web page.

[5]

© UCLES 2024 0478/12/F/M/24


9

5 Complete the description of digital currencies using the terms provided.

blockchains changed datachains decentralised

deleted encryption passport physical address

physically records time-stamp traced

transaction-chains virtually

A digital currency does not exist ........................................................... , it can only be accessed

electronically.

Some digital currencies have digital ledgers called ........................................................... .

These are decentralised databases where each transaction is stored as a new set of data with

a ........................................................... and is linked to the previous set of data. This means that

transactions cannot be altered, only new transactions added, which allows the location of the data

to be ........................................................... .
[4]

© UCLES 2024 0478/12/F/M/24 [Turn over


10

6 A self-driving tractor sows seeds and harvests crops for a farmer. The self-driving tractor moves
automatically through the field, turning at each end and stopping when it has finished.

(a) One reason the self-driving tractor is a robot is because it has a mechanical structure that
includes wheels, an engine, and a framework.

Give one other reason why the self-driving tractor is an example of a robot.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) If a person is detected within 3 metres whilst the tractor is moving, the self-driving tractor
must stop.

(i) Explain how an infra-red sensor, microprocessor and actuator can be used to stop the
self-driving tractor if a person is detected within 3 metres.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

(ii) Identify one other sensor that the self-driving tractor might use and how it will use the
sensor.

Sensor ...............................................................................................................................

Use ....................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2024 0478/12/F/M/24


11

(c) Explain the drawbacks of a farmer using a self-driving tractor to sow seeds and harvest crops.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(d) The self-driving tractor has an in-built expert system that the farmer can use to solve any
errors with the tractor.

Identify three components of an expert system.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(e) At the end of each day the self-driving tractor transmits the data it has collected to the farmer’s
computer in their house.

The transmission uses an echo check.

(i) Describe the role of the self-driving tractor and the farmer’s computer in the echo check.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

© UCLES 2024 0478/12/F/M/24 [Turn over


12

(ii) Another method of error checking is a parity block check.

The table shows 7 bytes that are transmitted using odd parity. The parity bit has been
completed for each byte.

Complete the parity byte for the data.

parity
bit 7 bit 6 bit 5 bit 4 bit 3 bit 2 bit 1
bit

byte 1 1 1 0 0 1 1 1 0

byte 2 1 0 0 0 0 1 1 0

byte 3 0 1 0 0 0 0 0 0

byte 4 0 1 0 0 1 1 1 1

byte 5 1 0 0 0 0 0 0 0

byte 6 0 1 1 1 1 1 1 1

byte 7 1 1 0 0 1 1 0 1

parity
byte
[3]

© UCLES 2024 0478/12/F/M/24


13

7 Data is transmitted using the internet.

(a) The data is encrypted before transmission.

(i) State the purpose of encrypting data.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Describe the differences between symmetric and asymmetric encryption.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(b) The data is transmitted using packet switching.

(i) Identify two items of data contained in a packet header.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(ii) Give the purpose of a router in the packet-switching process.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2024 0478/12/F/M/24 [Turn over


14

8 (a) Hexadecimal can be used to represent binary numbers.

(i) Convert the denary number 236 into hexadecimal.

...........................................................................................................................................

..................................................................................................................................... [1]

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(ii) Give one benefit of using hexadecimal instead of binary to represent data.

...........................................................................................................................................

..................................................................................................................................... [1]

(b) Two’s complement can be used to represent positive and negative binary integers.

(i) Convert the two’s complement integer 10110111 into denary.

Show all your working.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Convert the denary number 45 into an 8-bit two’s complement integer.

...........................................................................................................................................

..................................................................................................................................... [1]

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

© UCLES 2024 0478/12/F/M/24


15

(c) Logical shifts are performed on binary integers.

State the mathematical effect of a right shift of four places on a positive binary integer.

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2024 0478/12/F/M/24


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2024 0478/12/F/M/24


Cambridge IGCSE™
* 0 0 6 3 3 2 5 4 1 2 *

COMPUTER SCIENCE 0478/11


Paper 1 Theory October/November 2021

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (LEG/AR) 202712/4
© UCLES 2021 [Turn over
2

1 Binary is a number system that is used by computers.

(a) Tick (3) one box to show whether binary is a base-2, base-10 or base-16 number system.

Tick (3)

Base-2

Base-10

Base-16
[1]

(b) Hexadecimal and denary are number systems that can be used by programmers.

Convert these four hexadecimal values into denary values.

09 ...........................................

10 ...........................................

28 ...........................................

A1 ...........................................

[4]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2021 0478/11/O/N/21


3

2 Magda has a mobile telephone.

She uses the touch screen on her telephone to send emails to her customers. The touch screen
breaks, stopping Magda from using it to type her emails.

(a) Identify one other input device that would be built into the mobile telephone that Magda could
use to send an email to her customers.

............................................................................................................................................. [1]

(b) The touch screen operates by using the conductive properties of the object that is used to
touch the screen.

State whether the touch screen is a resistive, capacitive or infra-red touch screen.

............................................................................................................................................. [1]

(c) Magda is listening to music on her mobile telephone when she receives a telephone call. A
signal is sent within the telephone to stop the music and output that a call has been received.

Give the name of this type of signal.

............................................................................................................................................. [1]

© UCLES 2021 0478/11/O/N/21 [Turn over


4

3 Five statements are given about the error-checking methods checksum, check digit and parity
check.

(a) Tick (3) to show whether each statement applies to checksum, check digit or parity check.
Some statements may apply to more than one error-checking method.

Check Parity
Statement Checksum digit check
(3) (3) (3)
uses an additional bit to create an odd or even number
of 1s

checks for errors on data entry

compares two calculated values to see if an error has


occurred

will not detect transposition errors

sends additional values when data is transmitted from a


computer to another
[5]

(b) Identify one other error-checking method.

............................................................................................................................................. [1]

4 Georgia is a wedding photographer. She wants to store 10 photographs on a USB flash memory
drive for a customer. Each photograph is 100 pixels wide and 50 pixels high.

The photographs are 8-bit colour photographs.

(a) Calculate the total file size, in kilobytes (kB), of all the photographs. For this calculation, you
may use the unit of measurement of 1024 or 1000.

Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Answer .................................................................... kB
[3]
© UCLES 2021 0478/11/O/N/21
5

(b) Georgia compresses photographs to store them on the USB flash memory drive. It is
important that the compression does not affect the quality of the photographs in any way.

State which type of compression is the most suitable. Justify your choice.

Compression type .....................................................................................................................

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

(c) Georgia uses a digital camera. The digital camera takes a photograph that is then converted
into a digital image.

Complete the paragraph about the operation of a digital camera, using the most appropriate
terms from the list. Not all terms in the list need to be used.

• analogue-to-digital
• binary
• charge-coupled
• digital-to-analogue
• lens
• light
• mirror
• pixel
• reflection
• sensor
• storage

When Georgia pushes the button to take a photograph, an aperture opens at the front of

the camera to allow ............................................................... to stream in through

the ............................................................... . This is captured by a sensor called a

............................................................... device. The ...............................................................

converter then converts each ............................................................... into a digital value.


[5]

© UCLES 2021 0478/11/O/N/21 [Turn over


6

5 Tamaz stores confidential data on his computer.

He uses the Internet regularly and is concerned about his data being viewed by unauthorised
people. He currently has one software method to stop his data being viewed, which is a password.

He wants to add other software methods to stop his data being viewed by unauthorised people.

(a) State two other software methods that Tamaz could use to stop his data being viewed by
unauthorised people.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Tamaz’s computer has an operating system. Two functions of the operating system are file
management and memory management.

State two other functions of the operating system.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

6 Six statements are given about the role of components in the Central Processing Unit (CPU).

(a) Tick (3) to show whether each statement applies to the Memory Address Register (MAR),
Memory Data Register (MDR) or Program Counter (PC).

Some statements may apply to more than one component.

MAR MDR PC
Statement
(3) (3) (3)

it is a register in the CPU

it holds the address of the next instruction to be processed

it holds the address of the data that is about to be fetched


from memory

it holds the data that has been fetched from memory

it receives signals from the control unit

it uses the address bus to send an address to another


component
[6]

(b) Identify the component in the CPU that carries out calculations.

............................................................................................................................................. [1]

© UCLES 2021 0478/11/O/N/21


7

7 (a) Tick (3) one box to identify if an internal Solid State Drive (SSD) is an example of primary,
secondary or off-line storage. Justify your choice.

Tick (3)

Primary

Secondary

Off-line

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

(b) Describe the operation of an SSD and how it stores data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 0478/11/O/N/21 [Turn over


8

8 Victoria develops a computer game to sell on a gaming website. She writes her program using
English-like statements.

(a) State which type of programming language Victoria is using.

............................................................................................................................................. [1]

(b) Victoria uses two different types of translator when creating the program for the computer
game.

State which translator is the most suitable for the given tasks.

Give the benefits of using that translator for the task.

You must choose a different translator for each task.

(i) To translate the code during development of the game.

Translator ..........................................................

Benefits .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

(ii) To translate the final program and upload to the website for distribution, without the
source code.

Translator ..........................................................

Benefits .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2021 0478/11/O/N/21


9

9 A washing machine uses sensors and a microprocessor to control the washing cycle of clothes.

(a) A sensor is used in each of the given tasks.

Identify one suitable sensor that would be used for each task.

Each sensor given must be different.

Task Sensor

checking the water is 30 °C

checking the water acidity level after detergent is added

checking the weight of the clothes to make sure that the machine is
not overloaded
[3]

(b) Describe how the sensor and the microprocessor are used to make sure the water remains
at 30 °C.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2021 0478/11/O/N/21 [Turn over


10

10 Consider the following logic statement:

X = (((A OR B) OR (NOT (B XOR C))) AND C)

(a) Draw a logic circuit to represent the given logic statement.

Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.

B X

[5]

(b) State the name of a logic gate that does not appear in the logic statement and draw the
symbol for the logic gate.

Name of logic gate ................................... Logic gate symbol:

[2]

© UCLES 2021 0478/11/O/N/21


11

(c) Complete the truth table for the given logic statement.

A B C Working space X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

11 The table contains descriptions relating to web pages and the Internet.

Complete the table with the correct terms for the given descriptions.

Term Description

the language used to create a web page

the type of software application used to display a web page

an address given to a computer, by a network, to allow the


computer to be uniquely identified
a text file sent by a web server to collect data about a user’s
browsing habits

the company that provides a connection to the Internet

[5]

© UCLES 2021 0478/11/O/N/21


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 0478/11/O/N/21


Cambridge IGCSE™
* 9 3 8 8 8 6 9 5 2 8 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory October/November 2021

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (KS/FC) 202713/4
© UCLES 2021 [Turn over
2

1 (a) Denary is a number system that is used by programmers.

Tick (✓) one box to show whether denary is a base-2, base-10 or base-16 number system.

Tick
(✓)

Base-2

Base-10

Base-16
[1]

(b) Hexadecimal values can be used to represent denary values.

Convert these four hexadecimal values into denary values.

05 ......................................................

20 ......................................................

1A ......................................................

AB ......................................................
[4]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2021 0478/12/O/N/21


3

(c) Hexadecimal values can also be converted to binary values.

Tick (✓) one box to show the correct 8-bit binary value for each hexadecimal value.

(i) Hexadecimal value 25

Tick
(✓)

00011001

00100101

10100001
[1]

(ii) Hexadecimal value 1B

Tick
(✓)

00011011

10110001

00011010
[1]

(d) (i) Give one way that hexadecimal is used in website development.

..................................................................................................................................... [1]

(ii) Give one way that hexadecimal is used in low-level programming.

..................................................................................................................................... [1]

2 A train company wants to install a self-service ticket machine system for its train stations. When
the customer has purchased their tickets, the machine will provide a paper ticket.

(a) One output device that is used in the ticket machine is a display screen.

Identify one other output device that is used in the ticket machine system.

............................................................................................................................................. [1]

(b) The train company does not want users to use a keyboard or a mouse to enter their data,
when buying a ticket. The company is worried that they may be stolen or get too dirty.

Identify one other input device that would be suitable for use in the ticket machine system, to
allow users to enter their data.

............................................................................................................................................. [1]

© UCLES 2021 0478/12/O/N/21 [Turn over


4

3 (a) Six statements are given about methods of data transmission.

Tick (✓) to show if each statement applies to serial simplex, parallel simplex, parallel
half-duplex or serial duplex data transmission. Some statements may apply to more than one
data transmission method.

Serial Parallel Parallel Serial


Statement simplex simplex half-duplex duplex
(✓) (✓) (✓) (✓)

bits are transmitted along a single wire

data is transmitted in both directions

it is only suitable for distances less


than 5 metres
bits from the same byte are
transmitted one after the other
data may not arrive in the correct
sequence
data is transmitted in both directions,
but only one direction at a time
[6]

(b) A Universal Serial Bus (USB) connection can be used to transmit data from a mobile device
to a computer.

Give three benefits of using a USB connection for this purpose.

Benefit 1 ...................................................................................................................................

...................................................................................................................................................

Benefit 2 ...................................................................................................................................

...................................................................................................................................................

Benefit 3 ...................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2021 0478/12/O/N/21


5

4 The paragraph explains the operation of different touch screen technologies.

Complete the paragraph using the list of terms. Not all terms in the list need to be used.

• capacitive
• change
• circuit
• conductive
• coordinates
• grid
• heat
• infra-red
• insulating
• light
• manufacture
• pressure
• resistive

In ............................................................................ touch screen technology, an electrostatic field

is present on the surface of the touch screen. The ............................................................................

properties of a user cause a ............................................................................ in the field. The

............................................................................ of the user’s touch can be calculated.

In ............................................................................ touch screen technology, a user pushes the

top layer of the screen and makes it connect with the bottom layer to complete a

............................................................................ .

This type of touch screen is cheaper to ............................................................................ .


[7]

© UCLES 2021 0478/12/O/N/21 [Turn over


6

5 Sammi works for a finance company and has a laptop that he uses for his work. He has confidential
data about his customers stored on his laptop.

Sammi does not connect the laptop to any networks.

(a) Sammi is concerned about his customers’ confidential data being viewed by other people in
his office.

One method he uses to prevent others viewing the data is encryption.

Identify three other methods Sammi could use to prevent his customers’ confidential data
being viewed.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(b) Sammi creates videos for the finance company website that give customers advice about
their finances.

He uses lossy compression to reduce the file size of the videos for the website.

(i) Give three ways that lossy compression can reduce the file size of the videos.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

(ii) Give one drawback of using lossy compression to reduce the file size of the videos.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2021 0478/12/O/N/21


7

(c) Sammi could have used lossless compression to compress the videos for the website.

(i) Give one reason why he would use lossless compression, rather than lossy compression,
for the videos.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Give two disadvantages of Sammi using lossless compression, rather than lossy
compression, for the videos.

Disadvantage 1 .................................................................................................................

...........................................................................................................................................

Disadvantage 2 .................................................................................................................

...........................................................................................................................................
[2]

6 A programmer can use translators, such as an interpreter and a compiler, when developing a
computer program.

(a) Give one similarity between a compiler and an interpreter.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Describe two differences between a compiler and an interpreter.

Difference 1 ..............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Difference 2 ..............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(c) Identify one other type of translator.

............................................................................................................................................. [1]

© UCLES 2021 0478/12/O/N/21 [Turn over


8

7 Five statements are given about devices.

Tick (✓) to show if each statement applies to a 3D scanner, barcode reader or a Quick Response
(QR) code reader. Some statements may apply to more than one type of device.

3D Barcode QR code
Statement scanner reader reader
(✓) (✓) (✓)
uses position and alignment markers for orientation
when scanning

scans the shape and appearance of an object

uses reflected light from a laser to convert


a black-and-white pattern into binary
can often be built into an Electronic Point Of Sale
(EPOS) terminal, for example, a supermarket checkout

it is an example of an input device


[5]

8 An electronic game has three square mats that are coloured red, green and blue.

The player will see a colour displayed on a screen and has 1 second to hit the mat that matches
the colour. If the player hits the correct mat, within 1 second, a counter is incremented. When a
player hits an incorrect mat, the game ends.

The game uses sensors and a microprocessor to determine if the player hits the correct mat within
1 second.

Explain how the game uses sensors and a microprocessor to count the number of times a player
hits a correct mat within 1 second.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

© UCLES 2021 0478/12/O/N/21


9

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [7]

9 Padma opens an application on her computer.

An interrupt is generated to inform the Central Processing Unit (CPU) that the application has
been opened.

(a) Give three other examples of when an interrupt signal could be generated.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(b) State what would happen if interrupt signals were not used in a computer.

...................................................................................................................................................

............................................................................................................................................. [1]

10 Jermain uses the Secure Socket Layer (SSL) protocol for secure transmission when sending data
using the internet.

(a) Explain how the SSL protocol secures the data for transmission.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Identify an alternative protocol that could be used for secure transmission of data using the
internet.

............................................................................................................................................. [1]

(c) Give two ways that a user can identify if a website uses secure data transmission.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]
© UCLES 2021 0478/12/O/N/21 [Turn over
10

11 Consider the following logic statement:

X = (((A AND B) OR (NOT (B OR C))) NAND C)

(a) Draw a logic circuit to represent the given logic statement.

Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.

B X

[5]

© UCLES 2021 0478/12/O/N/21


11

(b) Complete the truth table for the given logic statement.

A B C Working space X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

(c) Identify two logic gates that are not included in the given logic statement.

Logic gate 1 ...............................................................................................................................

Logic gate 2 ..............................................................................................................................


[2]

© UCLES 2021 0478/12/O/N/21


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 0478/12/O/N/21


Cambridge IGCSE™
* 1 6 1 7 9 3 6 7 6 4 *

COMPUTER SCIENCE 0478/13


Paper 1 Theory October/November 2021

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages.

DC (PQ/FC) 202714/5
© UCLES 2021 [Turn over
2

1 (a) Xia has three files stored on her computer.

Tick (3) one box to show which is the largest file size.

Tick
File size
(✔)
999 kB

1 MB

850 000 bytes


[1]

(b) Denise has three files stored on her computer.

Tick (3) one box to show which is the smallest file size.

Tick
File size
(✔)
4000 MB

2 GB

2 500 000 kB
[1]

© UCLES 2021 0478/13/O/N/21


3

2 A sports stadium has an electronic counter that counts each person that enters the stadium.

The count is stored as binary in a 16-bit register.

A denary value of the count is displayed on a screen at the entrance.

(a) The screen currently displays:

0 0 7 1

Give the binary value that is stored in the register to display the count shown.

Binary value: .............................................................................................................................

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(b) More people enter the sports stadium and the screen now displays:

0 2 5 7

Give the binary value that is stored in the register to display the count shown.

Binary value: .............................................................................................................................

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2021 0478/13/O/N/21 [Turn over


4

(c) After everyone has entered the stadium, the register stores the binary value:

0000001000000100
Show what the screen will display when this binary value is stored.

Display:

[1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(d) Sensors are used at the entrance to count the number of people entering the stadium.

(i) Identify two sensors that could be used to count the number of people entering the
stadium.

Sensor 1 ............................................................................................................................

Sensor 2 ............................................................................................................................
[2]

(ii) Tick (3) one box to show if a sensor is an example of an input device, storage device or
output device.

Tick
Device
(✔)
input

storage

output
[1]

© UCLES 2021 0478/13/O/N/21


5

3 Five statements are given about error-checking methods.

(a) Tick (3) to show whether each statement applies to Automatic Repeat reQuest (ARQ), check
digit or checksum. Some statements may apply to more than one error-checking method.

ARQ Check digit Checksum


Statement
(✔) (✔) (✔)

checks for errors on data entry

uses a process of acknowledgement and


timeout
compares two calculated values to see if an
error has occurred
may resend data until it is confirmed as
received
checks for errors in data after transmission
from a computer to another
[5]

(b) Identify one other error-checking method.

............................................................................................................................................. [1]

© UCLES 2021 0478/13/O/N/21 [Turn over


6

4 Frederick prints a document that he has typed.

The printer begins to print the document, but then a message is displayed on Frederick’s computer
to say that the paper has jammed.

(a) Describe the role of an interrupt in generating a message on the computer that the paper has
jammed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Give two other examples of when an interrupt signal could be generated.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(c) The type of data transmission between the computer and the printer is serial half-duplex data
transmission.

(i) Describe how data is transmitted using serial half-duplex data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2021 0478/13/O/N/21


7

(ii) Explain why the data transmission needs to be half-duplex rather than simplex.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

5 In a Von Neumann model for a computer system, a Central Processing Unit (CPU) contains a
number of different components.

The table contains the name of a component or a description of their role in the fetch-execute
cycle.

Complete the table with the missing component names and descriptions.

Component name Description

............................................................................................................
Memory Address
Register (MAR) ............................................................................................................

............................................................................................................

............................................................................................................
Program Counter (PC)
............................................................................................................

............................................................................................................

This is a register that is built into the arithmetic logic unit. It


......................................
temporarily holds the result of a calculation.

This is a register that holds data or an instruction that has been


......................................
fetched from memory.

............................................................................................................
Control Unit (CU)
............................................................................................................

............................................................................................................

...................................... This carries addresses around the CPU.

[6]

© UCLES 2021 0478/13/O/N/21 [Turn over


8

6 The paragraph describes an MP3 file, MP4 file and a MIDI file.

Complete the paragraph using the list of terms. Not all terms in the list need to be used.

• can
• cannot
• compressed
• image
• microphone
• MIDI
• MP3
• MP4
• notes
• pixels
• speaker
• should
• uncompressed

................................................................. files are a multimedia format that stores video and audio.

................................................................. files are only used as a digital recording of sound; they

are created using a ................................................................. and recording software. The data in

the file is ................................................................. .

................................................................. files contain instructions on how to create the

sound. They are created using digital instruments. The file stores individual

................................................................., each one ................................................................. be

changed in this type of file.


[7]

© UCLES 2021 0478/13/O/N/21


9

7 Julius creates a computer application that calculates how many years it will take to pay for a
house.

(a) Julius uploads his application to his website for people to download. Before he uploads the
application, he translates the code using a compiler.

Explain why Julius uses a compiler, rather than an interpreter, to do this.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Julius also creates videos to explain how to use the application that he has created. He
reduces the file size of the videos using lossless compression.

(i) Describe how lossless compression reduces the file size of the video.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) State why Julius uses lossless compression, rather than lossy compression.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2021 0478/13/O/N/21 [Turn over


10

(c) Julius wants to distribute his application to a wider audience. He is considering distributing it
as freeware or free software.

(i) Describe freeware and free software.

Freeware ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Free software ....................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

(ii) Julius also considers distributing a trial version of the application.

Identify the type of software he could use to distribute his application as a trial version.

..................................................................................................................................... [1]

(d) Julius makes sure that all data transmission to and from his website is secure.

One way a user can check if his website uses secure data transmission is to check its
certificate.

Give two other ways that a user can identify if his website uses secure data transmission.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2021 0478/13/O/N/21


11

8 Consider the following logic statement:

X = (((A OR B) AND (NOT(B XOR C))) OR NOT C)

(a) Draw a logic circuit to represent the given logic statement.

Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.

B
X

[6]

(b) Complete the truth table for the given logic statement.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2021 0478/13/O/N/21 [Turn over


12

9 A parity check is used to check for errors after transmission on the four given binary values.

All four values are transmitted and received correctly.

Identify whether each 8-bit binary value has been sent using odd or even parity by writing odd or
even in the type of parity column.

Binary value Type of parity

10011001

01111110

11100000

00111001

[4]

10 (a) A denial of service (DoS) attack is a type of Internet security risk.

State the purpose of a denial of service attack.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Phishing and pharming are also types of Internet security risk. They have the same purpose.

State the purpose of phishing and pharming.

...................................................................................................................................................

............................................................................................................................................. [1]

(c) Identify three other types of Internet security risk.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 0478/13/O/N/21


Cambridge IGCSE™
* 5 4 1 6 5 1 8 6 8 7 *

COMPUTER SCIENCE 0478/11


Paper 1 Theory October/November 2022

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages.

DC (PQ) 303744/3
© UCLES 2022 [Turn over
2

1 A shopping mall has an information point. Visitors can use it to find out which shops are in the mall
and where they are located.

(a) Identify one input device that could be built into the information point.

Give an example of how that device would be used.

Input device ..............................................................................................................................

Example ....................................................................................................................................
[2]

(b) Identify one output device that could be built into the information point.

Give an example of how that device would be used.

Output device ...........................................................................................................................

Example ....................................................................................................................................
[2]

(c) Identify one example of primary storage that could be built into the information point.

State what would be stored in your example of primary storage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2022 0478/11/O/N/22


3

2 Phil has a computer that is designed using the Von Neumann model. The computer has a
central processing unit (CPU).

(a) One type of component within the CPU is an address bus.

Identify two other types of bus and state what each is responsible for transmitting in the CPU.

Bus 1 ........................................................................................................................................

...................................................................................................................................................

Bus 2 ........................................................................................................................................

...................................................................................................................................................
[4]

(b) The CPU performs a cycle that has three stages. One of these stages is execute.

Identify one other stage of the cycle that is performed by the CPU.

............................................................................................................................................. [1]

(c) Identify the component within the CPU that the accumulator is built into and describe the
purpose of the accumulator.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2022 0478/11/O/N/22 [Turn over


4

3 Error codes for a computer are often displayed as hexadecimal values. Each error code is stored
in a 12-bit binary register.

(a) The error code 404 means ‘file not found’.

Give the 12-bit binary value that would be stored for the hexadecimal error code 404

...................................................................................................................................................

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(b) The error code 12B means ‘hardware fault’.

Give the 12-bit binary value that would be stored for the hexadecimal error code 12B

...................................................................................................................................................

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(c) Hexadecimal values can also be represented as denary values.

The hexadecimal error code 022 means ‘file system error’. The hexadecimal error code 0AC
means ‘insufficient memory’.

Convert the hexadecimal error codes 022 and 0AC to denary values.

022 ...........................................

0AC ...........................................

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]
© UCLES 2022 0478/11/O/N/22
5

(d) The register stores the binary value 100111100000

Give the hexadecimal error code that would be displayed for the binary value 100111100000

...................................................................................................................................................

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(e) Give two reasons why error codes are represented in hexadecimal, instead of binary.

Reason 1 ..................................................................................................................................

...................................................................................................................................................

Reason 2 ..................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2022 0478/11/O/N/22 [Turn over


6

4 Rebekah discovers that her bank details have been used fraudulently.

She thinks her bank details were stolen electronically, whilst she was using the Internet.

(a) Identify and describe two methods that could have been used to steal Rebekah’s bank details
electronically.

Method 1 ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Method 2 ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2022 0478/11/O/N/22


7

(b) Rebekah decides to encrypt the data that she transmits whilst using the Internet. She does
this to keep the data safe.

(i) State why encryption helps keep the data safe.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) The data is encrypted using symmetric encryption.

Describe how the data is encrypted using symmetric encryption.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(iii) Identify three other methods Rebekah could use to help keep her data safe.

Method 1 ...........................................................................................................................

Method 2 ...........................................................................................................................

Method 3 ...........................................................................................................................
[3]

© UCLES 2022 0478/11/O/N/22 [Turn over


8

5 Consider the logic statement:

X = ((((B OR C) AND NOT C) NAND B) OR NOT A)

(a) Draw a logic circuit to represent the given logic statement.

Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.

B X

[6]

(b) State the name of one logic gate that is not included in the given logic statement.

............................................................................................................................................. [1]

© UCLES 2022 0478/11/O/N/22


9

(c) Complete the truth table for the given logic statement.

A B C Working space X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1

[4]

6 A computer sends the data for an image to the print buffer, to wait to be processed for printing,
until the buffer is full.

When the buffer is no longer full, it sends a signal back to the computer to state it is ready for more
data.

State the name of this signal and give two other examples of when this type of signal is used.

Signal name .....................................................................................................................................

Examples .........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[3]

© UCLES 2022 0478/11/O/N/22 [Turn over


10

7 Cameron writes software for coffee machines. He uses assembly language to write his software.

(a) Tick (3) to show whether assembly language is an example of a high-level language,
a low-level language or machine code.

Tick (3)

High-level language

Low-level language

Machine code
[1]

(b) Identify the translator that is required for assembly language.

............................................................................................................................................. [1]

(c) Give two reasons why Cameron chooses to write the software for the coffee machines in
assembly language.

Reason 1 ..................................................................................................................................

...................................................................................................................................................

Reason 2 ..................................................................................................................................

...................................................................................................................................................
[2]

(d) Give two drawbacks of using assembly language to write programs.

Drawback 1 ...............................................................................................................................

...................................................................................................................................................

Drawback 2 ...............................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2022 0478/11/O/N/22


11

8 Eleanor has a website that she uses to advertise the cakes that she bakes.

(a) Hypertext Markup Language (HTML) is used to create the website. The HTML is separated
into presentation and structure.

(i) Give two examples of HTML presentation.

Example 1 .........................................................................................................................

Example 2 .........................................................................................................................
[2]

(ii) Give two examples of HTML structure.

Example 1 .........................................................................................................................

Example 2 .........................................................................................................................
[2]

(b) Eleanor uses a secure connection to allow customers to buy the cakes from her website.

Describe how the secure connection is created.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

© UCLES 2022 0478/11/O/N/22 [Turn over


12

(c) Eleanor’s website uses cookies.

Explain what is meant by the term cookies and give two examples of how cookies can be
used.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(d) Eleanor is worried about a denial of service (DoS) attack on her web server.

She wants to help prevent a DoS attack reaching the web server.

Identify a security method that she could use to help prevent a DoS attack.

Explain how the method you identify helps to prevent the attack.

Security method ........................................................................................................................

Explanation ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 0478/11/O/N/22


Cambridge IGCSE™
* 6 1 0 4 1 1 8 3 2 6 *

COMPUTER SCIENCE 0478/12


Paper 1 Theory October/November 2022

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages.

DC (MB) 303733/3
© UCLES 2022 [Turn over
2

1 A bus station has a ticket machine.

A customer can use the ticket machine to select and pay for their ticket.

One input device built into the ticket machine is a touch screen.

(a) Identify two other input devices that could be built into the ticket machine.

Input device 1 ...........................................................................................................................

Input device 2 ...........................................................................................................................


[2]

(b) The ticket machine has a help icon that a user can touch to contact customer support.

The ticket machine has an output device that allows the user to hear the customer support
person.

Identify an output device that would be used for this purpose.

............................................................................................................................................. [1]

(c) The touch screen for the ticket machine uses resistive technology.

(i) Describe how resistive touch screen technology operates to recognise a user’s touch.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2022 0478/12/O/N/22


3

(ii) Give two benefits of using resistive touch screen technology for the ticket machine.

Benefit 1 ............................................................................................................................

...........................................................................................................................................

Benefit 2 ............................................................................................................................

...........................................................................................................................................
[2]

(iii) Give two drawbacks of using resistive touch screen technology for the ticket machine.

Drawback 1 .......................................................................................................................

...........................................................................................................................................

Drawback 2 .......................................................................................................................

...........................................................................................................................................
[2]

(iv) Identify one other touch screen technology that could have been used.

..................................................................................................................................... [1]

(d) The computer in the ticket machine uses the stored program concept.

Describe the stored program concept.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2022 0478/12/O/N/22 [Turn over


4

(e) The computer in the ticket machine has an operating system.

One function of the operating system is to provide an interface for the user.

State three other functions of the operating system.

Function 1 .................................................................................................................................

Function 2 .................................................................................................................................

Function 3 .................................................................................................................................
[3]

(f) The computer uses 12-bit binary registers to store data whilst it is being processed.

Customers are given a denary ticket number.

(i) Give the 12-bit binary value that is stored in the register for each denary ticket number.

100 ....................................................................................................................................

235 ....................................................................................................................................

301 ....................................................................................................................................

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2022 0478/12/O/N/22


5

(ii) Show the denary ticket number that would be given to the customer for each 12-bit binary
value.

000000010110 ...................................................................................................................

000001110111 ...................................................................................................................

001101011001 ...................................................................................................................

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

(iii) Binary values can also be represented as hexadecimal values.

Show the hexadecimal value that represents each of the two 12-bit binary values.

000010010101 ..................................................................................................................

101011010001 ...................................................................................................................

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

© UCLES 2022 0478/12/O/N/22 [Turn over


6

2 An automated water tap system uses a sensor and a microprocessor to operate. Water flows
from the tap when a person’s hands are placed underneath the tap. Water stops flowing when the
person’s hands are removed from underneath the tap.

(a) Explain how the water tap system uses a sensor and a microprocessor to operate.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

(b) Three descriptions are shown of different systems.

Identify the most suitable sensor that could be used in each system.

Description of system Sensor

it checks the air is dry enough in a garage that spray paints cars

it automatically switches on the headlights on a car when it is dark

it checks that the soil in a greenhouse has the correct level of acidity

[3]

© UCLES 2022 0478/12/O/N/22


7

3 Five statements are shown about Random Access Memory (RAM), an internal
Solid State Drive (SSD) and a USB flash memory drive.

Tick (✓) to show which statements apply to each component. Some statements may apply to
more than one component.

Component
Internal USB flash
RAM
Statement SSD memory drive
(✓)
(✓) (✓)

it is a type of primary storage

it is volatile

it uses NAND and NOR technology

it does not have any moving parts

it is not directly connected to the


central processing unit (CPU)
[5]

4 Doris has data stored on her computer.

She accidentally loses some data by deleting a file.

State two methods she could use to help prevent accidental loss of data in this way.

Describe how each method would help prevent accidental loss of the data.

Method 1 ..........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Method 2 ..........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[4]

© UCLES 2022 0478/12/O/N/22 [Turn over


8

5 8 bytes of data are transmitted from one computer to another. Each byte of data has a parity bit.

The data is also sent with a parity byte. Each bit in the parity byte allows a check to be performed
on each column of bits.

A parity check is performed on the data and an error is found in one bit. The table shows the data
that was received.

Parity
Bit 2 Bit 3 Bit 4 Bit 5 Bit 6 Bit 7 Bit 8
bit

Byte 1 0 1 0 1 0 0 1 1

Byte 2 1 0 0 1 1 1 1 1

Byte 3 1 1 1 1 1 1 0 0

Byte 4 1 1 0 1 0 1 0 1

Byte 5 1 0 0 0 1 1 1 0

Byte 6 1 1 1 0 1 0 1 1

Byte 7 1 1 0 0 1 1 0 0

Byte 8 1 1 1 1 0 0 1 1

Parity
1 0 1 1 0 1 1 1
byte

Identify which bit has an error by giving the Byte number and Bit number.

Explain how you found the error.

Byte number ..............................

Bit number .................................

Explanation ......................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[4]

© UCLES 2022 0478/12/O/N/22


9

6 Jian has a website that uses the Secure Socket Layer (SSL) protocol to make sure that data is
kept secure during transmission.

(a) Give two ways that a user could check that a website uses the SSL protocol.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) State the name of the updated version of the SSL protocol.

............................................................................................................................................. [1]

(c) Jian’s system for his website has a proxy server.

Explain why Jian uses a proxy server as part of the system for his website.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2022 0478/12/O/N/22 [Turn over


10

(d) Jian sells products using his website. He wants to create a secure login system for user
accounts.

He is worried that a user’s login details may be gathered by malware when they are logging
into their account.

(i) State the type of malware that could be used to gather a user’s login details.

..................................................................................................................................... [1]

(ii) Give three methods that could be used to help prevent a user’s login details being
gathered by malware, when they are logging into their account.

Describe how each method can help prevent this happening.

Method 1 ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Method 2 ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Method 3 ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[6]

© UCLES 2022 0478/12/O/N/22


11

(e) The paragraph describes how the web pages are obtained and displayed for the user.

Complete the paragraph using the list of terms. Not all terms in the list need to be used.

• browser
• Hypertext Markup Language (HTML)
• Internet Protocol (IP) address
• Internet Service Provider (ISP)
• Media Access Control (MAC) address
• presentation
• protocols
• structure
• Uniform Resource Locator (URL)
• web pages
• web server

The browser sends the ....................................................................................... to the

Domain Name Server (DNS) that looks up the corresponding

..................................................................................... . This is returned to the browser, which

then sends a request to the ...................................................................................... where the

.......................................................................................... are stored. The website is written in

.......................................................................................... that is rendered by the

.......................................................................................... .
[6]

7 NAND, OR and XOR are three types of logic gate.

(a) Four statements are shown about the logic gates.

Tick (✓) to show which statements apply to each logic gate. Some statements may apply to
more than one logic gate.

NAND OR XOR
Statement
(✓) (✓) (✓)

if both inputs are 1, the output is 1

if both inputs are different from each other, the output is 1

if both inputs are 0, the output is 0

if both inputs are the same as each other, the output is always 0

[4]

© UCLES 2022 0478/12/O/N/22 [Turn over


12

(b) NAND, OR, XOR, NOR and NOT are all examples of logic gates.

State the name of one other logic gate and complete its truth table.

Logic gate .................................................... Truth table:

A B Output

0 0

0 1

1 0

1 1
[2]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 0478/12/O/N/22


Cambridge IGCSE™
* 2 1 5 2 4 5 9 2 9 1 *

COMPUTER SCIENCE 0478/13


Paper 1 Theory October/November 2022

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages.

DC (RW) 303774/2
© UCLES 2022 [Turn over
2

1 Five components are shown.

Tick (✓) to show whether each component is an example of input, output or storage.

Input Output Storage


Component
(✓) (✓) (✓)

actuator

register

sensor

mouse

Digital Versatile Disc (DVD)

[5]

2 (a) Denary values are converted to binary values to be processed by a computer.

Draw one line from each denary value to the correctly converted 8‑bit binary value.

Denary 8-bit binary

11110101

72
01110010

11100101

245
00010101

00001111
15

01001000

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]
© UCLES 2022 0478/13/O/N/22
3

(b) Binary values can be converted to hexadecimal values.

Give the hexadecimal value for the 16‑bit binary value 0000100110101110

...................................................................................................................................................

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

3 Jessica wants to store a large number of small thumbnail images on a USB flash memory drive.
Each thumbnail image is 16‑bit colour and is 100 pixels wide and 100 pixels high.

She has 5 MB of storage space available on her USB flash memory drive.

Calculate how many images she can store in the 5 MB of storage space. Show all your working.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Number of images ..................................................


[4]

© UCLES 2022 0478/13/O/N/22 [Turn over


4

4 A company wants to manufacture a mobile phone.

(a) The company needs to decide which touch screen technology to use.

State one type of touch screen technology that you recommend the company use.

Justify your choice.

Touch screen type ....................................................................................................................

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(b) The mobile phone uses Random Access Memory (RAM) and Read Only Memory (ROM).

RAM and ROM are both examples of the same type of storage.

Identify this type of storage and justify your answer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2022 0478/13/O/N/22


5

(c) The mobile phone has a USB port to allow a USB connection to a computer.

(i) Describe how data is transmitted using a USB connection.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) One benefit of a USB connection is that the cable can only be inserted into the port one
way, so an incorrect connection cannot be made.

Give three other benefits of using a USB connection to connect a mobile phone to a
computer.

Benefit 1 ............................................................................................................................

...........................................................................................................................................

Benefit 2 ............................................................................................................................

...........................................................................................................................................

Benefit 3 ............................................................................................................................

...........................................................................................................................................
[3]

(d) When a user is reading a text on the mobile phone, they may also get a telephone call on the
mobile phone. An interrupt signal is generated that results in an output to inform the user that
a person is calling them.

Describe how the interrupt signal is processed to inform the user that a person is calling
them.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2022 0478/13/O/N/22 [Turn over


6

5 Consider the logic statement:

X = ((((B AND C) OR NOT C) NOR B) XOR NOT A)

(a) Draw a logic circuit to represent the given logic statement.

Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.

B X

[6]

© UCLES 2022 0478/13/O/N/22


7

(b) Complete the truth table for the given logic statement.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2022 0478/13/O/N/22 [Turn over


8

6 A museum has Quick Response (QR) codes that allow visitors to view videos for extra information
about items in the museum.

The visitor is given a portable device with a display screen, that they can use to read each QR
code.

(a) Describe how the QR code is read and processed to display the video for the visitor.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Tick (✓) to show whether the videos are MP3 files, MP4 files or MIDI files.

Tick (✓)

MP3 files

MP4 files

MIDI files
[1]

(c) The video files are compressed using lossy compression.

Give two benefits of using lossy compression to compress the video files.

Benefit 1 ...................................................................................................................................

...................................................................................................................................................

Benefit 2 ...................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2022 0478/13/O/N/22


9

(d) The portable device has a Light‑Emitting Diode (LED) display screen to allow the visitor to
watch a video.

Describe how the LED screen operates to display the video.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2022 0478/13/O/N/22 [Turn over


10

7 The paragraph explains how an instruction is processed by the Central Processing Unit (CPU).

Complete the paragraph using the list of terms. Not all terms in the list need to be used.

• address bus
• Arithmetic Logic Unit (ALU)
• calculations
• data bus
• decoded
• execute
• fetched
• interrupt
• Memory Address Register (MAR)
• Memory Data Register (MDR)
• Program Counter (PC)
• protocol
• ROM
• stored

An instruction is .................................................................... from RAM into the CPU, where

it is temporarily stored in the .................................................................... . The instruction is

then sent along the .................................................................... to the Control Unit (CU) to be

.................................................................... . The ....................................................................

will then perform any .................................................................... and logic operations that are

required to .................................................................... the instruction.


[7]

© UCLES 2022 0478/13/O/N/22


11

8 A computer can have both a Media Access Control (MAC) address and an Internet Protocol (IP)
address.

(a) Give two similarities between a MAC address and an IP address.

Similarity 1 ................................................................................................................................

...................................................................................................................................................

Similarity 2 ................................................................................................................................

...................................................................................................................................................
[2]

(b) Give two differences between a MAC address and an IP address.

Difference 1 ..............................................................................................................................

...................................................................................................................................................

Difference 2 ..............................................................................................................................

...................................................................................................................................................
[2]

9 A system uses parity checks and Automatic Repeat reQuests (ARQ) to detect and correct errors
in the transmission of data.

Describe how parity checks and ARQ operate together to detect and correct errors.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2022 0478/13/O/N/22 [Turn over


12

10 Mario has a website that he uses to sell his artwork.

(a) The website uses HTTPS to transmit data.

(i) Describe what is meant by HTTPS.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) One way a user can check a website uses HTTPS is to check whether the
Uniform Resource Locator (URL) begins with HTTPS.

Give one other way a user can check if a website uses HTTPS.

...........................................................................................................................................

..................................................................................................................................... [1]

(b) There is a risk that people that use the Internet to access websites can have their stored data
maliciously damaged.

State three ways that stored data can be maliciously damaged.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 0478/13/O/N/22


Cambridge IGCSE™
* 7 7 1 9 9 1 0 7 7 6 *

COMPUTER SCIENCE 0478/11


Paper 1 Computer Systems October/November 2023

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (LK) 314031/3
© UCLES 2023 [Turn over
2

1 A student uses a computer and several hardware devices to complete his schoolwork.

The computer has a central processing unit (CPU).

(a) The student uses a keyboard to complete his schoolwork.

Tick (3) one box to show which type of device the keyboard is.

A input

B memory

C output

D storage
[1]

(b) The student uses a printer to print his schoolwork.

Tick (3) one box to show which type of device the printer is.

A input

B memory

C output

D storage
[1]

(c) A component in the CPU sends signals to manage the fetch-decode-execute cycle.

State the name of this component.

............................................................................................................................................. [1]

(d) The CPU has a clock speed of 2.4 Ghz.

Describe what is meant by a 2.4 Ghz clock speed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/11/O/N/23


3

(e) The CPU contains registers including the memory data register (MDR).

(i) Describe the role of the MDR in the fetch-decode-execute cycle.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Identify three other registers contained in the CPU.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

2 A car park has a payment machine that allows a customer to pay for their parking.

The cost of parking is displayed as a denary number on a screen on the payment machine.

The cost of parking is stored in two 8-bit binary registers.

For the parking cost of $10.50:


• register 1 stores the denary value 10 as binary
• register 2 stores the denary value 50 as binary.

(a) Give the parking cost that would be displayed on the payment machine when the registers
store:
• register 1: 00010001
• register 2: 01000110

Parking cost displayed $ ............................................................................... [2]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2023 0478/11/O/N/23 [Turn over


4

(b) The parking cost of $14.98 is displayed on the payment machine.

Give the 8-bit binary numbers that are stored in the registers to display the parking cost.

Register 1 .................................................................................................................................

Register 2 .................................................................................................................................
[2]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(c) The payment machine gives the customer a ticket when they have paid their parking cost.
Each ticket has a 4-digit hexadecimal ticket number that is stored as binary.

The binary number 1010000000111101 is stored for a customer’s ticket number.

Give the hexadecimal ticket number that would be displayed on this customer’s ticket.

Hexadecimal ticket number ................................................................................................ [4]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(d) Explain why data input into the payment machine needs to be converted to binary.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/11/O/N/23


5

(e) When a customer is leaving the car park they arrive at a barrier. The customer needs to insert
their ticket into a system at the barrier. This system reads the ticket number then checks
whether the parking cost has been paid for the car. The barrier is raised if it has been paid.

The system uses a microprocessor.

Describe the role of the microprocessor in the system and how it checks whether the parking
cost has been paid.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

3 The table contains four descriptions about a computer system.

Complete the table by writing the correct term for each description.

Term Description

A collective term for the physical components


....................................................................... of the computer system.

A type of software that provides services


that the user requires and allows the user to
.......................................................................
perform tasks on the computer.

A type of software that manages the


main functions of the computer, including
.......................................................................
managing files and managing memory.

A type of software that is stored in the


read only memory (ROM). It includes the
....................................................................... basic input output system (BIOS) and the
bootloader.
[4]

© UCLES 2023 0478/11/O/N/23 [Turn over


6

4 Data is transmitted between a computer and a printer.

(a) The data is transmitted one bit at a time down a single wire. The computer can transmit data
to the printer and the printer can transmit data to the computer, using the same connection.

Circle the two data transmission methods that will transmit data in this way.

parallel full-duplex parallel half-duplex parallel simplex

serial full-duplex serial half-duplex serial simplex


[2]

(b) An odd parity check is used to detect errors in the data transmission.

Explain how the odd parity check detects errors.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(c) Another error detection method sends the data from the computer to the printer, then a copy
of the data received is sent back from the printer to the computer. The two sets of data are
compared to see if they match.

State the name of this type of error detection method.

............................................................................................................................................. [1]

© UCLES 2023 0478/11/O/N/23


7

5 A musician is recording herself playing the music for a song on the piano.

(a) Explain how the analogue sound is recorded and converted to digital.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

(b) State two ways that the accuracy of the recording could be increased.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(c) The musician compresses the sound file using lossless compression instead of lossy
compression.

Explain why the musician would choose to use lossless compression instead of lossy
compression.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2023 0478/11/O/N/23 [Turn over


8

(d) The musician types the words for the song into a document.

Two character sets that can be used when converting text to digital are the American standard
code for information interchange (ASCII) and Unicode.

Explain the differences between the ASCII character set and the Unicode character set.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

6 Draw and annotate a diagram to demonstrate how a firewall works.

[4]
© UCLES 2023 0478/11/O/N/23
9

7 Complete the statements about data packets and packet switching.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

destination address first footer header

last main data packets payload

routers servers trailer

Data is broken down into packets. A data packet has a packet .......................................................

that contains the packet number and the ....................................................... .

Each packet could take a different path from the sender to the receiver; this is controlled by

...................................................... .

Packets may arrive out of order. Once the ...................................................... packet has arrived,

the packets are reordered.


[4]

8 Storage can be described as being magnetic, solid-state or optical.

(a) Give two features of magnetic storage.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Give three features of solid-state storage.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]
© UCLES 2023 0478/11/O/N/23 [Turn over
10

(c) Give one example of each type of storage.

Magnetic ...................................................................................................................................

Solid-state .................................................................................................................................

Optical ......................................................................................................................................
[3]

9 An interrupt is a type of signal that is used in a computer.

(a) State the name of the type of software that manages interrupts.

............................................................................................................................................. [1]

(b) Describe how interrupts are used when a key is pressed on a keyboard.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

(c) Interrupts can be hardware based or software based.

A key press is one example of a hardware interrupt.

(i) Give two other examples of a hardware interrupt.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2023 0478/11/O/N/23


11

(ii) Give two examples of a software interrupt.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2023 0478/11/O/N/23


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2023 0478/11/O/N/23


Cambridge IGCSE™
* 9 1 5 0 6 4 5 6 9 9 *

COMPUTER SCIENCE 0478/12


Paper 1 Computer Systems October/November 2023

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages.

DC (LK) 314033/2
© UCLES 2023 [Turn over
2

1 Malware can be used to corrupt data stored on a computer.

(a) Tick (3) one box to show which cyber security threat is not a type of malware.

A Phishing

B Ransomware

C Virus

D Worm
[1]

(b) Identify one other example of malware than those given in part 1(a).

............................................................................................................................................. [1]

(c) Identify the type of software that is used to find and remove malware from a computer.

............................................................................................................................................. [1]

2 A register stores the binary number:

1 1 1 0 0 0 1 1

(a) Give the denary number for the binary number stored in the register.

............................................................................................................................................. [1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Give the hexadecimal number for the binary number stored in the register.

............................................................................................................................................. [2]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2023 0478/12/O/N/23


3

(c) A logical left shift of two places is performed on the binary number stored in the register.

Complete the binary register to show its contents after this logical left shift.

[1]

(d) The negative denary number −99 needs to be stored in the register.

Complete the register to show the binary number that would be stored, using two’s
complement. Show all your working.

Working space ..........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Register:
[2]

(e) The number 01001100 is added to 11100011

Add the two 8-bit binary numbers, using binary addition.

Give your answer in binary. Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2023 0478/12/O/N/23 [Turn over


4

3 A user’s computer has a central processing unit (CPU) that has a clock speed of 2 GHz.

She wants to change it to a CPU that has a clock speed of 3 GHz.

(a) (i) State what is meant by clock speed.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Explain the effect this change will have on the performance of the CPU.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(b) The CPU contains a memory address register (MAR).

Describe the role of the MAR in the fetch–decode–execute cycle.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) The CPU has a list of all the machine code commands it can process.

State the name of this list of commands.

............................................................................................................................................. [1]

4 A washing machine is an example of an embedded system.

(a) Give two characteristics of an embedded system.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2023 0478/12/O/N/23


5

(b) Circle three other examples of an embedded system.

freezer laptop

personal computer (PC) security light system smartphone

vending machine web server


[3]

5 A band is recording their new song. They need to consider the sample rate and sample resolution
of their recording.

(a) Give one benefit of using a higher sample rate to record the song.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Give one drawback of using a higher sample rate to record the song.

...................................................................................................................................................

............................................................................................................................................. [1]

(c) Describe what is meant by sample resolution.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(d) The band wants to compress the sound file, but they do not want any data to be permanently
removed.

Identify the compression method that should be used.

............................................................................................................................................. [1]

© UCLES 2023 0478/12/O/N/23 [Turn over


6

6 The table contains descriptions about data transmission methods.

Complete the table by identifying which data transmission methods are described.

Data transmission method Description

Data is transmitted down a single wire, one bit at a time,


............................................................ in one direction only.

Data is transmitted down multiple wires, multiple bits at a


............................................................ time, in both directions, but only one direction at a time.

Data is transmitted down a single wire, one bit at a time,


............................................................ in both directions at the same time.

Data is transmitted down multiple wires, multiple bits at


............................................................ a time, in one direction only.

[4]

7 A train station has a ticket inspector who checks each customer’s ticket before they are allowed to
get on the train.

The train station wants a system that will allow the tickets to be automatically checked.

(a) Identify two suitable input devices that can be used to automatically read the tickets.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

© UCLES 2023 0478/12/O/N/23


7

(b) The train driver pushes a button to close the train door when all passengers have boarded
the train. The train door will only close when there are no passengers in the doorway.

The system to check there are no passengers in the doorway uses a sensor and a
microprocessor.

Explain how the sensor and the microprocessor are used to check whether the train door can
be closed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2023 0478/12/O/N/23 [Turn over


8

8 (a) Draw and annotate a diagram that demonstrates the cyber security threat of data interception.

[4]

(b) Identify one security solution that will help keep data safe from data interception and state
why it will help keep the data safe.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]
© UCLES 2023 0478/12/O/N/23
9

9 The table contains terms and descriptions about the internet.

Complete the table with the missing terms and descriptions.

Term Description

.................................................. the collective name for all the web pages available

a small text file, stored by the web browser, that can store
..................................................
a user’s personal data

...........................................................................................

uniform resource locator (URL) ...........................................................................................

...........................................................................................

...........................................................................................

web server ...........................................................................................

...........................................................................................

the language used to create a website. Example tags are


..................................................
<head> and <body>

.................................................. a protocol that is used to request and send web pages

[6]

© UCLES 2023 0478/12/O/N/23 [Turn over


10

10 A business has a system that is described as having artificial intelligence (AI).

(a) State one of the main characteristics of an AI system.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) An AI system is an expert system.

Explain how an expert system operates.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

11 A manufacturing company uses an automated system in its manufacturing process.

(a) The automated system uses a flow sensor.

Identify what a flow sensor measures.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2023 0478/12/O/N/23


11

(b) Explain one advantage to employees of using an automated system in manufacturing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) Explain one disadvantage to the company owner of using an automated system in
manufacturing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

12 Digital currency can be used to pay for products and services.

Digital currencies are often tracked using digital ledgers.

(a) Give two other features of digital currency.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Identify the process that uses a digital ledger to track the use of digital currency.

............................................................................................................................................. [1]

© UCLES 2023 0478/12/O/N/23 [Turn over


12

13 Storage and memory are important components of a computer system.

(a) Primary storage is one type of storage in a computer system.

(i) Tick (3) one box to show which is an example of primary storage.

A compact disk (CD)

B hard disk drive (HDD)

C random access memory (RAM)

D solid-state drive (SSD)


[1]

(ii) Give one characteristic of primary storage.

..................................................................................................................................... [1]

(b) Virtual memory can be created in a computer system.

Complete the description about virtual memory.

Use the terms from the list.

Some of the terms in the list will not be used. Some terms may be used more than once.

binary hard disk drive (HDD) hexadecimal operating system

pages random access memory (RAM) read only memory (ROM)

sectors software tracks virtual memory

Virtual memory is used when the ...................................................................... is full. It is

created by partitioning the ...................................................................... . Data is divided into

...................................................................... that can be sent from

...................................................................... to the

...................................................................... to be temporarily stored until they are required.


[5]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2023 0478/12/O/N/23


Cambridge IGCSE™
* 2 3 6 8 9 8 2 0 0 8 *

COMPUTER SCIENCE 0478/13


Paper 1 Computer Systems October/November 2023

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (LK) 314035/3
© UCLES 2023 [Turn over
2

1 A mobile telephone has built-in input and output devices.

(a) Give two examples of an input device that would be built into a mobile telephone.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Give one example of an output device that would be built into a mobile telephone.

............................................................................................................................................. [1]

(c) The data storage in the mobile telephone can be measured using different units of
measurement.

(i) State how many bits are equal to a byte.

..................................................................................................................................... [1]

(ii) State how many kibibytes (KiB) equal a mebibyte (MiB).

..................................................................................................................................... [1]

(d) The mobile telephone has an operating system.

Describe the purpose of the operating system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

2 Humans use a denary number system and computers use a binary number system.

(a) Explain what is meant by a binary number system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/13/O/N/23


3

(b) Convert the denary numbers 14, 59 and 234 to binary.

14 ..............................................................................................................................................

59 ..............................................................................................................................................

234 ............................................................................................................................................
[3]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(c) Convert the denary numbers 9, 26 and 65 to hexadecimal.

9 ................................................................................................................................................

26 ..............................................................................................................................................

65 ..............................................................................................................................................
[3]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(d) Convert the positive denary number 123 to 8-bit binary using two’s complement.

Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/13/O/N/23 [Turn over


4

(e) Add the binary values 00110011 and 01111000 using binary addition.

Give your answer in binary. Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

3 A computer has a central processing unit (CPU).

(a) Circle three components that are built into the CPU.

accumulator (ACC) control unit (CU) graphics card

hard disk drive (HDD) motherboard program counter (PC)

random access memory (RAM) read only memory (ROM)


[3]

(b) The CPU has cache.

Explain the purpose of the cache.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/13/O/N/23


5

(c) The CPU has a component that regulates the number of fetch–decode–execute cycles the
CPU can perform in a second.

State the name of this component.

............................................................................................................................................. [1]

(d) The CPU has a component that carries out all calculations and logical operations.

State the name of this component.

............................................................................................................................................. [1]

4 An employee uses a web browser on their computer.

(a) Describe the main purpose of a web browser.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) The employee wants his payment details to be automatically filled in when he buys products
using the internet.

Identify the function of a web browser that could be used for this purpose.

............................................................................................................................................. [1]

(c) The employee wants to be able to quickly access websites that he regularly uses.

Identify the function of a web browser that could be used for this purpose.

............................................................................................................................................. [1]

(d) The web browser uses the secure socket layer (SSL) protocol to transmit personal data
securely over the internet.

State how the SSL protocol secures the data for transmission.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2023 0478/13/O/N/23 [Turn over


6

5 Errors can occur when data is transmitted.

(a) Give one reason an error may occur when data is transmitted.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Some error detection methods use a calculated value to check for errors.

Tick (3) one box to show which error detection method does not use a calculated value to
check for errors.

A Check digit

B Checksum

C Echo check

D Parity check
[1]

(c) An automatic repeat request (ARQ) can be used to make sure that data is received free of
errors. It can use a positive or negative acknowledgement method to do this.

Explain how an ARQ operates using a positive acknowledgement method.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

© UCLES 2023 0478/13/O/N/23


7

6 A company uses cloud storage to store its data.

(a) Tick (3) one box to show which is not a characteristic of cloud storage.

A Data is accessed through a network

B Data is stored locally

C Data is stored remotely

D Physical servers are used to store the data


[1]

(b) Explain two advantages for the owners of the company of storing its data in cloud storage.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(c) Explain one disadvantage to employees of the company storing data in the cloud.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/13/O/N/23 [Turn over


8

7 A photographer takes an image with a digital camera. The photographer sets the resolution and
colour depth for the image.

(a) State what is meant by the image resolution.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) State what is meant by the image colour depth.

...................................................................................................................................................

............................................................................................................................................. [1]

(c) Give one benefit of increasing the colour depth of the image.

...................................................................................................................................................

............................................................................................................................................. [1]

(d) The photographer compresses the image using a method that permanently reduces the
colour depth and resolution of the image.

Identify which compression method the photographer uses.

............................................................................................................................................. [1]

(e) One benefit for compressing the image is to reduce the storage space it uses.

Give two other benefits of compressing the image.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2023 0478/13/O/N/23


9

8 Draw and annotate a diagram to represent the role of a router.

[4]

9 A computer has secondary storage.

(a) The table contains statements about secondary storage.

Complete the table by writing the type of secondary storage that applies to each statement.
Some types of secondary storage may apply to more than one statement.

Type of secondary storage Statement

data is stored using pits and lands


................................................

data is stored using control gates and floating gates


................................................

data is stored using electromagnets


................................................

data is stored using a laser


................................................
data is stored on a platter that is divided into tracks and
................................................ sectors
[5]

© UCLES 2023 0478/13/O/N/23 [Turn over


10

(b) Explain two differences between primary storage and secondary storage.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

10 A car repair garage uses an expert system.

(a) Complete the description about the operation of the expert system.

Use the terms from the list. Some of the terms in the list will not be used.

inference engine interface knowledge base

machine learning mechanical engine output device

question base rule base

An expert system has a ....................................................... that contains a list of facts.

The ....................................................... applies the .......................................................

to the ....................................................... to reach a diagnosis for the repair of the car.

The user provides data to the system using an ....................................................... .


[5]

© UCLES 2023 0478/13/O/N/23


11

(b) The expert system has machine learning capabilities.

Describe what is meant by machine learning capabilities.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2023 0478/13/O/N/23


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2023 0478/13/O/N/23

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy