0% found this document useful (0 votes)
701 views12 pages

Cambridge IGCSE: Computer Science 0478/12

This document is an examination paper for Cambridge IGCSE Computer Science, specifically Paper 1 on Computer Systems, scheduled for February/March 2025. It includes instructions for answering questions, information about the marking scheme, and a variety of questions covering topics such as number systems, image compression, computer architecture, and network protocols. The paper is structured to assess students' understanding of computer science concepts and their practical applications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
701 views12 pages

Cambridge IGCSE: Computer Science 0478/12

This document is an examination paper for Cambridge IGCSE Computer Science, specifically Paper 1 on Computer Systems, scheduled for February/March 2025. It includes instructions for answering questions, information about the marking scheme, and a variety of questions covering topics such as number systems, image compression, computer architecture, and network protocols. The paper is structured to assess students' understanding of computer science concepts and their practical applications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

* 0000800000001 *

, ,

Cambridge IGCSE™

¬Wz> 4mHuOªEŠ]{6€W
¬Hs{N¬wjs‚>i—™Œ¨‚
¥eE•55e5 ••E 5 •eU
* 1 0 7 7 0 5 7 4 9 8 *

COMPUTER SCIENCE 0478/12


Paper 1 Computer Systems February/March 2025

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (KAS) 342614/2
© UCLES 2025 [Turn over
* 0000800000002 *

DO NOT WRITE IN THIS MARGIN


2
, ,

1 (a) Complete the sentences about number systems.

Use the items from the list.

Some of the items in the list will not be used. You should only use an item once.

A B C D E F G

H W X Y Z 0 1

2 4 8 10 16 127 128

DO NOT WRITE IN THIS MARGIN


255 256

The binary number system is base ......................... . The smallest denary number that can be

represented as an 8-bit binary number is ......................... . The largest denary number that

can be represented as an 8-bit binary number is ......................... .

The hexadecimal number system is base ......................... . Each hexadecimal digit is

DO NOT WRITE IN THIS MARGIN


equivalent to ......................... bits. The numbers 1 to 9 are used and the number 10 is

represented by ......................... . The hexadecimal number system continues up to the

number 15, which is represented by ......................... .


[7]

(b) Two 8-bit binary numbers are given.

Add the two 8-bit binary numbers using binary addition.

Give your answer in binary. Show all your working.

DO NOT WRITE IN THIS MARGIN


10011011
+00010011 DO NOT WRITE IN THIS MARGIN

[3]

ĬÕú¾Ġ´íÈõÏĪÅĊàù¸þ×
© UCLES 2025 ĬÈñüÏĠąđÑþøáđĝé´ĠĂ
ĥõÕĕõÕĥÕµÕÅąąõĥÕąÕ
0478/12/F/M/25
* 0000800000003 *
DO NOT WRITE IN THIS MARGIN

3
, ,

(c) Binary addition can result in overflow.

Tick (✓) one box to show the correct definition of overflow in binary addition.

A The answer has created a negative number that cannot be represented


in binary addition.

B The answer is the result of a logical shift that cannot be performed in


binary addition.
DO NOT WRITE IN THIS MARGIN

C The answer is too large to represent in the number of bits available.

D The answer is too small to represent in the number of bits available.


[1]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

Ĭ×ú¾Ġ´íÈõÏĪÅĊàû¸þ×
© UCLES 2025 ĬÈòû×ĪĉġèüĉĨÅĕí´ĐĂ
ĥõåÕµµąµååĕąąĕąĕĕÕ
0478/12/F/M/25 [Turn over
* 0000800000004 *

DO NOT WRITE IN THIS MARGIN


4
, ,

2 An artist creates an image on a computer.

(a) State what is meant by the colour depth of an image.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Describe the relationship between the resolution of the image and the file size of the image.

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) The artist compresses the image file before uploading it to their website. Users can download
the image file from the website to print as a poster.

The image file is compressed using lossless compression.

DO NOT WRITE IN THIS MARGIN


(i) Explain the reasons why the artist chose lossless compression instead of lossy
compression to compress this image file.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


..................................................................................................................................... [3]

(ii) Identify one lossless method of compressing an image.

Describe your chosen method.

Method ..............................................................................................................................

Description ........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

...........................................................................................................................................
[3]

ĬÕú¾Ġ´íÈõÏĪÅĊÞù¸Ā×
© UCLES 2025 ĬÈòú×ĤûĨÓöĂğħ¹ÏäĨĂ
ĥÅõÕõµąĕÅąĥąÅĕåĕąÕ
0478/12/F/M/25
* 0000800000005 *
DO NOT WRITE IN THIS MARGIN

5
, ,

(d) The artist emails the image file to their friends.

(i) Explain how a file is broken down into packets and transmitted over a network.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]
DO NOT WRITE IN THIS MARGIN

(ii) The packets can use many different methods of data transmission to travel.

Complete and annotate the diagram to show the difference between serial full-duplex
transmission between two computers and parallel simplex transmission between two
computers.

Serial full-duplex transmission:

Computer 1 Computer 2
DO NOT WRITE IN THIS MARGIN

Parallel simplex transmission:

Computer 1 Computer 2
DO NOT WRITE IN THIS MARGIN

[3]

Ĭ×ú¾Ġ´íÈõÏĪÅĊÞû¸Ā×
© UCLES 2025 ĬÈñùÏĦ÷ĘæĄïê³ÁċäĘĂ
ĥÅąĕµÕĥõÕõµąÅõÅÕĕÕ
0478/12/F/M/25 [Turn over
* 0000800000006 *

DO NOT WRITE IN THIS MARGIN


6
, ,

3 A computer has a central processing unit (CPU), memory and secondary storage.

(a) The computer has a Von Neumann architecture.

Circle three registers that are found in the Von Neumann architecture.

accumulator arithmetic register binary counter

binary register control register current data register

DO NOT WRITE IN THIS MARGIN


current instruction register data counter instruction counter

logical register program counter storage register

[3]

(b) State the purpose of the CPU in the computer.

...................................................................................................................................................

............................................................................................................................................. [1]

DO NOT WRITE IN THIS MARGIN


(c) Computer A has a 2.1 GHz quad-core processor.

Computer B has a 2.5 GHz dual-core processor.

Computer C has a 5.2 GHz single-core processor.

(i) Identify which computer is most likely to execute more instructions simultaneously.

Justify your answer.

Computer ...........................

Justification .......................................................................................................................

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

(ii) Explain why Computer C can execute more instructions per second than Computer B.

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

..................................................................................................................................... [2]

ĬÙú¾Ġ´íÈõÏĪÅĊßûµþ×
© UCLES 2025 ĬÈòùÔĠďĎÞćþÓÓ¹ĪČĨĂ
ĥĕåĕµõĥÕĕĕĕąąõĥĕÅÕ
0478/12/F/M/25
* 0000800000007 *
DO NOT WRITE IN THIS MARGIN

7
, ,

(d) All three computers have the same instruction set.

Define the term instruction set.

...................................................................................................................................................

............................................................................................................................................. [1]

4 An automated teller machine (ATM) is a device where a person inserts their bank card and can
request to withdraw money. The ATM also allows the person to check how much money they have
DO NOT WRITE IN THIS MARGIN

in their bank account.

(a) A sensor is used to detect when a person stands within 1 metre of the ATM. When a person is
detected, a welcome message is displayed on the screen.

(i) Identify an appropriate sensor for the ATM to use to detect a person.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Describe the role of the microprocessor in detecting the person.


DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(b) Describe the features of the ATM that identify it as an embedded system.
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) The ATM has a touch screen and a keypad.

The ATM may need to be used by people who are unable to see.
DO NOT WRITE IN THIS MARGIN

Identify one other input device and one other output device that can be built into the ATM to
help people who are unable to see.

Input ..........................................................................................................................................

Output .......................................................................................................................................
[2]
ĬÛú¾Ġ´íÈõÏĪÅĊßùµþ×
© UCLES 2025 ĬÈñúÜĪēĞÛñóĖćÁ®ČĘĂ
ĥĕÕÕõĕąµąĥÅąąĕąÕÕÕ
0478/12/F/M/25 [Turn over
* 0000800000008 *

DO NOT WRITE IN THIS MARGIN


8
,  ,

5 A computer is connected to a network.

(a) The computer has a network interface card (NIC) that has a media access control (MAC)
address.

(i) One purpose of the NIC is to provide the computer with a MAC address.

Describe the other purposes of the NIC.

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Identify three characteristics of a MAC address.

1 ........................................................................................................................................

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

(b) The network allocates an internet protocol (IP) address to the computer.

(i) Tick (✓) one box to identify a valid IPv4 address.

DO NOT WRITE IN THIS MARGIN


A 110:255:2:1

B 1.30.2FF.A9

C 3.162.74.3

D 8.0.257.6.8
[1]
DO NOT WRITE IN THIS MARGIN

ĬÙú¾Ġ´íÈõÏĪÅĊÝûµĀ×
© UCLES 2025 ĬÈñûÜĤġīàïüčåĝĐĜĠĂ
ĥåąÕµĕąĕĥŵąÅĕåÕÅÕ
0478/12/F/M/25
* 0000800000009 *
DO NOT WRITE IN THIS MARGIN

9
,  ,

(ii) Identify the device in a network that can automatically assign an IP address to a
computer, each time the computer connects to the network.

..................................................................................................................................... [1]

(c) A user accesses the world wide web using a web browser.

(i) Define the term world wide web.

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

..................................................................................................................................... [1]

(ii) The uniform resource locator (URL) for a website includes the protocol hypertext transfer
protocol secure (HTTPS).

Explain how HTTPS makes the transmission of data secure.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(iii) The protocol is one part of a URL.


DO NOT WRITE IN THIS MARGIN

Give the other two parts of a URL.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]
DO NOT WRITE IN THIS MARGIN

ĬÛú¾Ġ´íÈõÏĪÅĊÝùµĀ×
© UCLES 2025 ĬÈòüÔĦĝěÙĉąÜñĕÌĜĐĂ
ĥåõĕõõĥõõµĥąÅõÅĕÕÕ
0478/12/F/M/25 [Turn over
* 0000800000010 *

DO NOT WRITE IN THIS MARGIN


10
, ,

6 A search engine uses artificial intelligence (AI) to identify the most relevant web pages for the
user.

(a) One characteristic of AI is the ability to learn.

Identify three other characteristics of AI.

1 ................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

(b) The search engine uses machine learning.

Explain how machine learning is used by the search engine.

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

DO NOT WRITE IN THIS MARGIN


7 Programs can be written in a high-level language or a low-level language.

(a) Machine code is one type of low-level language.

Identify one other type of low-level language.

Identify the translator that is needed for the type of low-level language you have identified.

Type of low-level language .......................................................................................................

Translator ..................................................................................................................................
[2]
DO NOT WRITE IN THIS MARGIN

ĬÙú¾Ġ´íÈõÏĪÅĊàû·þ×
© UCLES 2025 ĬÈôûÑĢĩíâøó·ÉğüäĘĂ
ĥõĥĕµĕåĕÅõµÅŵåÕõÕ
0478/12/F/M/25
* 0000800000011 *
DO NOT WRITE IN THIS MARGIN

11
, ,

(b) A high-level language can be translated into a low-level language, using a compiler or an
interpreter.

Describe the advantages of using an interpreter instead of a compiler during software


development.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(c) Integrated development environments (IDEs) provide translators.


DO NOT WRITE IN THIS MARGIN

Identify three other common functions of an IDE.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................
[3]
DO NOT WRITE IN THIS MARGIN

ĬÛú¾Ġ´íÈõÏĪÅĊàù·þ×
© UCLES 2025 ĬÈóüÙĨĥý×ĂþòčėàäĨĂ
ĥõĕÕõõÅõÕąĥÅÅÕÅĕĥÕ
0478/12/F/M/25
* 0000800000012 *

DO NOT WRITE IN THIS MARGIN


12
, ,

BLANK PAGE

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
ĬÙú¾Ġ´íÈõÏĪÅĊÞû·Ā×
© UCLES 2025 ĬÈóùÙĞėČäĀąù¯»þ´ĐĂ
ĥÅÅÕµõÅÕµåĕÅąÕĥĕõÕ
0478/12/F/M/25

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy