0% found this document useful (0 votes)
86 views12 pages

Cambridge IGCSE: Computer Science 0478/12

Uploaded by

Aaradhana Umesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
86 views12 pages

Cambridge IGCSE: Computer Science 0478/12

Uploaded by

Aaradhana Umesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

* 0000800000001 *

, ,

Cambridge IGCSE™

¬Wz> 4mHuOªEŠ]z6€W
¬g-qQ©nZtzM›‹q—‚
¥5u•uu ueuuE uEU•U
* 4 5 5 8 2 9 8 0 6 8 *

COMPUTER SCIENCE 0478/12


Paper 1 Computer Systems October/November 2024

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (WW) 336223/3
© UCLES 2024 [Turn over
* 0000800000002 *

DO NOT WRITE IN THIS MARGIN


2
, ,

1 Different types of software can be run on a computer.

(a) State what is meant by software.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Utility software is one type of software that can be run on a computer.

Tick (3) one box to show which software is an example of utility software.

DO NOT WRITE IN THIS MARGIN


A spreadsheet

B anti-virus

C web browser

D database
[1]

(c) Identify the type of software that manages inputs and outputs for the computer.

DO NOT WRITE IN THIS MARGIN


............................................................................................................................................. [1]

2 Data storage can be measured using different units of measurement.

(a) Identify the name of the smallest unit of measurement of data.

............................................................................................................................................. [1]

(b) State how many nibbles there are in 2 bytes.

............................................................................................................................................. [1]

DO NOT WRITE IN THIS MARGIN


(c) A 10 second sound effect is recorded for a movie.

It is recorded with a sample rate of 22,016 Hz and a sample resolution of 8 bits.

Calculate the file size of the sound effect in kibibytes (KiB). Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

Answer ..................................................... KiB


[3]
ĬÕú¾Ġ´íÈõÏĪÅĊàü¸þ×
© UCLES 2024 Ĭç¯òÔĝúħáý²ãĦ»ÉďĂ
ĥĥĥĕµĕÅĕĕµåąąµåĕµÕ
0478/12/O/N/24
* 0000800000003 *
DO NOT WRITE IN THIS MARGIN

3
, ,

(d) The sound effect file is compressed for storage.

(i) State what is meant by file compression.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Give one benefit of compressing the file for storage.

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

..................................................................................................................................... [1]

3 A user enters data that is hexadecimal into a computer system. The data is converted to binary to
be processed by the computer.

(a) (i) Give one similarity between hexadecimal and binary.

...........................................................................................................................................

..................................................................................................................................... [1]
DO NOT WRITE IN THIS MARGIN

(ii) Give two differences between hexadecimal and binary.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(b) Data that is denary can also be converted to binary.


DO NOT WRITE IN THIS MARGIN

Give the binary number for each of the three denary numbers.

15 ..............................................................................................................................................

180 ............................................................................................................................................

235 ............................................................................................................................................
[3]

Working space

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
Ĭ×ú¾Ġ´íÈõÏĪÅĊàú¸þ×
© UCLES 2024 Ĭç°ñÜīöėØûñ÷÷ĎğÉğĂ
ĥĥĕÕõõåõąÅõąąÕÅÕåÕ
0478/12/O/N/24 [Turn over
* 0000800000004 *

DO NOT WRITE IN THIS MARGIN


4
, ,

(c) Denary numbers can also be converted to hexadecimal.

Give the hexadecimal number for each of the three denary numbers.

14 ..............................................................................................................................................

100 ............................................................................................................................................

250 ............................................................................................................................................
[3]

DO NOT WRITE IN THIS MARGIN


Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

(d) A binary integer that is stored in a register in the computer has a logical left shift performed on it.

(i) Describe the process of the logical left shift that is performed on the binary integer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

DO NOT WRITE IN THIS MARGIN


(ii) State what effect this will have on the binary integer.

...........................................................................................................................................

..................................................................................................................................... [1]

(e) A negative binary integer needs to be stored in a register in the computer.

Give the name of the number system that can be used to represent negative binary integers.

............................................................................................................................................. [1]
DO NOT WRITE IN THIS MARGIN

ĬÕú¾Ġ´íÈõÏĪÅĊÞü¸Ā×
© UCLES 2024 Ĭç°ôÜġĈĒãõúðÕ²½ÙėĂ
ĥÕÅÕµõåÕĥĥąąÅÕĥÕµÕ
0478/12/O/N/24
* 0000800000005 *
DO NOT WRITE IN THIS MARGIN

5
, ,

4 A student has a smartwatch.

(a) The smartwatch has built-in input and output devices.

Identify two input devices that can be built into the smartwatch.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]
DO NOT WRITE IN THIS MARGIN

(b) Identify one output device that can be built into the smartwatch.

............................................................................................................................................. [1]

(c) The smartwatch has read only memory (ROM).

Explain why the smartwatch needs ROM.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

............................................................................................................................................. [2]

(d) The smartwatch uses a text message application that receives data from cloud storage.

(i) Describe what is meant by cloud storage.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

..................................................................................................................................... [2]

(ii) Explain two benefits of the application using cloud storage.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]
Ĭ×ú¾Ġ´íÈõÏĪÅĊÞú¸Ā×
© UCLES 2024 Ĭç¯óÔħČĢÖăć¹āÊęÙħĂ
ĥÕµĕõĕŵõĕÕąÅµąĕåÕ
0478/12/O/N/24 [Turn over
* 0000800000006 *

DO NOT WRITE IN THIS MARGIN


6
, ,

(e) The smartwatch only displays the time and text messages.

A student incorrectly describes this smartwatch as a general-purpose computer.

Explain why the student’s description is incorrect.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


............................................................................................................................................. [2]

5 A barcode scanning system uses a check digit to check for errors in data on input.

(a) Explain how the barcode scanning system operates to check for errors.

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) After a barcode is scanned, data is sent to a stock control system to update the stock value

DO NOT WRITE IN THIS MARGIN


stored for that product.

The data is sent to the stock control system using serial simplex data transmission.

(i) Explain how the data is sent using serial simplex data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

..................................................................................................................................... [3]

ĬÙú¾Ġ´íÈõÏĪÅĊßúµþ×
© UCLES 2024 Ĭç°óÏĝĤĬÎĈöÄġ²üñėĂ
ĥąĕĕõµÅĕµõõąąµåÕõÕ
0478/12/O/N/24
* 0000800000007 *
DO NOT WRITE IN THIS MARGIN

7
, ,

(ii) Explain why serial simplex is the most appropriate method of data transmission for this
purpose.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

..................................................................................................................................... [3]

(iii) The data is checked for errors after it has been transmitted to the stock control system.

Give two error detection methods that could be used for this purpose.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]
DO NOT WRITE IN THIS MARGIN

6 The table contains names and descriptions of components in a central processing unit (CPU).

Complete the table by giving the missing component names and descriptions.

Component name Description

sends signals to manage the flow of data through the CPU


............................................................

...............................................................................................
DO NOT WRITE IN THIS MARGIN

program counter
...............................................................................................

...............................................................................................
stores the address of the data that is about to be fetched
............................................................ from random access memory (RAM) into the CPU

transmits data between the RAM and the CPU


............................................................

...............................................................................................
accumulator
DO NOT WRITE IN THIS MARGIN

...............................................................................................

...............................................................................................

stores an instruction when it is being decoded


............................................................
[6]
ĬÛú¾Ġ´íÈõÏĪÅĊßüµþ×
© UCLES 2024 Ĭç¯ô×īĠĜëòċąµÊàñħĂ
ĥąĥÕµÕåõåąåąąÕÅĕĥÕ
0478/12/O/N/24 [Turn over
* 0000800000008 *

DO NOT WRITE IN THIS MARGIN


8
,  ,

7 A student enters the uniform resource locator (URL) for a web page into their tablet computer.

(a) State what is meant by a URL.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Identify two different parts of a URL.

1 ................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


2 ................................................................................................................................................
[2]

(c) The student enters the URL into a piece of software that then displays the web page.

Identify the name of this software.

............................................................................................................................................. [1]

(d) Draw and annotate a diagram to show how the web page is located and retrieved to be
displayed on the student’s tablet computer.

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

[5]
ĬÙú¾Ġ´íÈõÏĪÅĊÝúµĀ×
© UCLES 2024 Ĭç¯ñ×ġĎčÐðĄþėĦþġďĂ
ĥµµÕõÕåÕÅåÕąÅÕĥĕõÕ
0478/12/O/N/24
* 0000800000009 *
DO NOT WRITE IN THIS MARGIN

9
,  ,

(e) The data for the web page is transmitted using the secure socket layer (SSL) protocol.

Complete the paragraph about the SSL protocol.

Use only terms from the list.

Not all terms need to be used. Some terms may be used more than once.

encrypted file server hypertext markup language (HTML)


DO NOT WRITE IN THIS MARGIN

hypertext transfer protocol (HTTP) operating system search engine

unencrypted URL web browser web server

The .............................................................. asks the ..............................................................

to identify itself. The ................................................................................ sends back its digital

certificate. The .................................................................. authenticates the digital certificate.


DO NOT WRITE IN THIS MARGIN

If it is authentic, ............................................................................... data transmission begins.


[5]

8 A robot vacuum cleaner uses sensors to navigate around obstacles in a room.

(a) Tick (3) one box to show which sensor would be the most suitable for this purpose.

A proximity

B flow
DO NOT WRITE IN THIS MARGIN

C pressure

D level
[1]

(b) An expert system can be used to diagnose an error with a robot vacuum cleaner.

Circle three components that are part of an expert system.

knowledge base operating system firewall


DO NOT WRITE IN THIS MARGIN

server printer actuator inference engine

rule base encryption


[3]

ĬÛú¾Ġ´íÈõÏĪÅĊÝüµĀ×
© UCLES 2024 Ĭç°òÏħĒĝéĊíËÃĎÚġğĂ
ĥµÅĕµµÅµÕÕąąÅµąÕĥÕ
0478/12/O/N/24 [Turn over
* 0000800000010 *

DO NOT WRITE IN THIS MARGIN


10
, ,

(c) Explain how the robot vacuum cleaner can make use of machine learning.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


.............................................................................................................................................. [3]

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

ĬÙú¾Ġ´íÈõÏĪÅĊàú·þ×
© UCLES 2024 Ĭç®ñÎģĖċÒ÷ċèûĨĪÙħĂ
ĥĥÕĕõÕąÕĥĕÕÅÅõĥĕÅÕ
0478/12/O/N/24
DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN

© UCLES 2024
,
* 0000800000011 *

ĥĥåÕµµĥµõĥąÅÅĕąÕÕÕ
Ĭç­òÖĥĚûçāöġßĐ®ÙėĂ
ĬÛú¾Ġ´íÈõÏĪÅĊàü·þ×
,
11

0478/12/O/N/24
BLANK PAGE
* 0000800000012 *

DO NOT WRITE IN THIS MARGIN


12
, ,

BLANK PAGE

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
ĬÙú¾Ġ´íÈõÏĪÅĊÞú·Ā×
© UCLES 2024 Ĭç­óÖğĬîÔÿíĪý´ĐÉğĂ
ĥÕõÕõµĥĕĕÅõÅąĕåÕÅÕ
0478/12/O/N/24

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy