0% found this document useful (0 votes)
321 views12 pages

Cambridge IGCSE: Asmita Parnami

This document is an examination paper for the Cambridge IGCSE Information and Communication Technology (0417/13) for October/November 2024. It includes instructions for answering questions, characteristics of memory types (ROM and RAM), file formats, comparisons between storage devices (SSD and HDD), and communication devices (switches and routers). Additionally, it addresses health issues related to computer use and the advantages and disadvantages of using smartphones versus desktop computers for gaming.

Uploaded by

asmita
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
321 views12 pages

Cambridge IGCSE: Asmita Parnami

This document is an examination paper for the Cambridge IGCSE Information and Communication Technology (0417/13) for October/November 2024. It includes instructions for answering questions, characteristics of memory types (ROM and RAM), file formats, comparisons between storage devices (SSD and HDD), and communication devices (switches and routers). Additionally, it addresses health issues related to computer use and the advantages and disadvantages of using smartphones versus desktop computers for gaming.

Uploaded by

asmita
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

* 0000800000001 *

, ,


Cambridge IGCSE

Asmita Parnami
¬Xw@4mIsQ¢MŠ@z6W
¬NHE•lLk{v™>P”FJ‚
¥ee•u•e•EuuU¥ ¥UuU

I A 1 4 5 0 2 0 9

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/13


*6982938712*

Paper 1 Theory October/November 2024


1 hour 30 minutes

You must answer on the question paper.


No additional materials are needed.

INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.

INFORMATION
• The total mark for this paper is 80.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages.

11_0417_13_2024_1.9
© UCLES 2024 [Turn over
* 0000800000002 *
2

DO NOT WRITE IN THIS MARGIN


, ,

1 A computer can use both ROM and RAM.

(a) State the characteristics of:

(i) ROM

Data can only be read


................................................................................................................................
Non-volatile memory
Stores data permanently
................................................................................................................................

................................................................................................................................

DO NOT WRITE IN THIS MARGIN


................................................................................................................................ [2]

(ii) RAM

Data can be written to and read from


................................................................................................................................
Volatile memory
Stores data temporarily
................................................................................................................................

................................................................................................................................

................................................................................................................................ [2]

DO NOT WRITE IN THIS MARGIN


(b) State one use for each of the following storage devices and media.

(i) ROM

Start-up instructions
................................................................................................................................
BIOS
Hardware initialisation routines
................................................................................................................................ [1]
Self-test procedures
(ii) RAM.

Stores the data the computer is currently processing


................................................................................................................................

DO NOT WRITE IN THIS MARGIN


................................................................................................................................ [1]

(iii) Blu-ray disc

Storing HD movies
................................................................................................................................
Video games
Data backup
................................................................................................................................ [1]

(iv) Magnetic tape


Storing backup data
................................................................................................................................
DO NOT WRITE IN THIS MARGIN

Stores an archive
................................................................................................................................ [1]

© UCLES 2024 ĬÖ÷Àĝ´íÉóÑĢÍĊ½ü¸ý× 11_0417_13_2024_1.9


ĬÎÆĂÈđàÞÔĆĄööæäîÂĂ
ĥõµĕµõĥõõµåĕĥÅąĕÕÕ
* 0000800000003 *
3
DO NOT WRITE IN THIS MARGIN

, ,

2 A computer can use different generic file formats.

(a) Describe each of the following generic file formats.

(i) csv

Comma Separated Values


................................................................................................................................
Delimited by commas
................................................................................................................................
Text file

................................................................................................................................
DO NOT WRITE IN THIS MARGIN

................................................................................................................................ [2]

(ii) rar

Roshal Archive
................................................................................................................................
Used for data compression
Data container to hold other files
................................................................................................................................

................................................................................................................................
DO NOT WRITE IN THIS MARGIN

................................................................................................................................ [2]

(iii) txt

Plain text file


................................................................................................................................
Contains un-formatted text data
................................................................................................................................
Can be used by any text editors

................................................................................................................................

................................................................................................................................ [2]
DO NOT WRITE IN THIS MARGIN

(b) The file formats txt, rar and csv are examples of generic file formats.

State three other examples of generic file formats.


css
1 ........................................................................................................................................
gif
htm / html
2 ........................................................................................................................................
jpg / jpeg
mp4 / mp3
3 ........................................................................................................................................
pdf
png [3]
DO NOT WRITE IN THIS MARGIN

rtf
svg
zip

© UCLES 2024 ĬØ÷Àĝ´íÉóÑĢÍĊ½ú¸ý×


ĬÎÅāÀėäÎåôí³âÎøî²Ă
11_0417_13_2024_1.9 [Turn over
ĥõÅÕõĕąĕĥÅõĕĥåĥÕÅÕ
* 0000800000004 *
4

DO NOT WRITE IN THIS MARGIN


, ,

(c) Explain the need for generic file formats.

Allows users to save files so that they can be opened on any platform
...........................................................................................................................................
The formatting of the file is not package-specific therefore formatting will not
affect the file
...........................................................................................................................................
Using generic formats allows files created on one type of computer to be read
on another type of computer
...........................................................................................................................................

........................................................................................................................................... [2]

DO NOT WRITE IN THIS MARGIN


3 Many people use portable solid-state drives (SSD) rather than portable hard disk drives (HDD).

Compare SSDs and HDDs. Your answer should include both similarities and differences.
Similarities:Both store data
..................................................................................................................................................
Both have fast access
Both have fixed storage capacity
..................................................................................................................................................
Both store files permanently
Both can be plugged into any computer system
..................................................................................................................................................
Both are secondary storage
Both allow data to be written to and read from
..................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


..................................................................................................................................................
Differences:SSD uses semi-conductor technology
..................................................................................................................................................
HDD uses magnetic technology
HDD can be affected by strong magnetic fields
..................................................................................................................................................
SSD are more robust as no moving parts
SSD produces less heat
..................................................................................................................................................
SSD uses less processing power
SSD use less electrical power
..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


.................................................................................................................................................. [6]

DO NOT WRITE IN THIS MARGIN

© UCLES 2024 ĬÖ÷Àĝ´íÉóÑĢÍĊ¿ü¸ÿ× 11_0417_13_2024_1.9


ĬÎÅĄÀčÒÛÒîö¼ĄòÖĞÊĂ
ĥÅĕÕµĕąµąĥąĕååÅÕÕÕ
* 0000800000005 *
5
DO NOT WRITE IN THIS MARGIN

, ,

4 A number of different communication devices can be connected to a network.

(a) Explain how the following devices operate.

(i) Switch

A switch connects a number of computers together to make a LAN


................................................................................................................................
Each device has a unique MAC address
The switch receives a signal from one device
................................................................................................................................
The signal contains the MAC address of the sender and receiver
Reads the recipient’s MAC address
................................................................................................................................
DO NOT WRITE IN THIS MARGIN

Sends data to the specific device


................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [4]
DO NOT WRITE IN THIS MARGIN

(ii) Router
A router connects to a modem
................................................................................................................................
The router splits the data into packets
Each packet contains the IP addresses and the data
................................................................................................................................
A router sends data packets to different networks
A router receives data packets from different networks
................................................................................................................................
All devices within the network contain unique IP addresses
The router stores IP addresses in its routing table
................................................................................................................................
The router reads the destination IP address
................................................................................................................................
Checks the IP address against its routing table
Finds the best / fastest route to the device using the routing table
................................................................................................................................
If it cannot find the best route it uses the default one
DO NOT WRITE IN THIS MARGIN

The router forwards the packet to the appropriate network segment


................................................................................................................................
Directs incoming and outgoing internet traffic to the device with the local IP
address
................................................................................................................................
The router can store a route to the target device [4]

(b) Bridges are communication devices.

Explain what bridges are used for.

Used to connect LANs together


...........................................................................................................................................
Connects different types of network so they act as one single LAN
DO NOT WRITE IN THIS MARGIN

........................................................................................................................................... [1]

© UCLES 2024 ĬØ÷Àĝ´íÉóÑĢÍĊ¿ú¸ÿ×


ĬÎÆăÈěÎëçČċíØĊĂкĂ
11_0417_13_2024_1.9 [Turn over
ĥÅĥĕõõĥÕĕĕÕĕåÅåĕÅÕ
* 0000800000006 *
6

DO NOT WRITE IN THIS MARGIN


, ,

(c) Ensuring the privacy and confidentiality of data becomes more important when using computer
networks.

Evaluate the different ways in which a user can ensure the privacy and confidentiality of data
by using passwords.
Strong passwords make it harder to crack the password
...........................................................................................................................................
Change passwords frequently using an unused password
Change passwords regularly to ensure that unauthorised access is lower
...........................................................................................................................................
Use different passwords on different accounts to ensure that if one password
is guessed others are safe
...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


Using biometric passwords as these are unique to the user
Biometric passwords are very hard to forge
...........................................................................................................................................
Safer to use a combination of different types of password
...........................................................................................................................................
For added security a One Time Password could be used
Ensure that the password cannot be linked back to the user as it makes it
...........................................................................................................................................
easier to guess
Biometric passwords can be affected by the environment
...........................................................................................................................................
Biometric passwords can be affected by human changes
OTP / biometric passwords require extra hardware to be used
...........................................................................................................................................

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN

© UCLES 2024 ĬÚ÷Àĝ´íÉóÑĢÍĊ¾úµý× 11_0417_13_2024_1.9


ĬÎÅăËđ¶áßÿúĈ¸òģÆÊĂ
ĥĕÅĕõÕĥõÕõõĕĥÅąÕĕÕ
* 0000800000007 *
7
DO NOT WRITE IN THIS MARGIN

, ,

5 Repetitive strain injury (RSI) and eye strain can be caused by using a computer. Taking breaks is
one strategy for reducing these health issues.

(a) State two causes of repetitive strain injury (RSI) and give two other strategies for preventing
it.

Causes: Typing on a computer keyboard for a long period of time


Cause 1 ............................................................................................................................
Excessive use of a mouse
Holding a mouse incorrectly
...........................................................................................................................................
Working in a cramped workspace
Resting the wrists on the desk when typing
Cause 2 ............................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................
Strategies: Use an ergonomic keyboard
Strategy 1 .........................................................................................................................
Use an ergonomic mouse
Use a wrist rest
...........................................................................................................................................
Arrange the workspace
Use voice recognition
Strategy 2 .........................................................................................................................
Exercise hands
...........................................................................................................................................

[4]
DO NOT WRITE IN THIS MARGIN

(b) State two causes of eye strain and give two other strategies for preventing it.

Causes: Staring at a computer screen for a long period of time


Cause 1 ............................................................................................................................
Sitting too close to the screen
Working in inappropriate lighting
...........................................................................................................................................
Glare on the computer screen
Cause 2 ............................................................................................................................
Dirt on the screens
Blue light affecting the eyes
...........................................................................................................................................

Strategies: Turn down / up the brightness of the screen to match the room
Strategy 1 .........................................................................................................................
DO NOT WRITE IN THIS MARGIN

lighting
Use flicker free screens
...........................................................................................................................................
Use blue light filters / glasses
Turn the screen 90 degrees to the window
Strategy 2 .........................................................................................................................
Use an adjustable screen
...........................................................................................................................................
Keep the screens clear of dust
Have eyes tested regularly
Use night screen mode [4]
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 ĬÜ÷Àĝ´íÉóÑĢÍĊ¾üµý×


ĬÎÆĄÃėºÑÚùćÁĤĊ·ÆºĂ
11_0417_13_2024_1.9 [Turn over
ĥĕµÕµµąĕÅąåĕĥåĥĕąÕ
* 0000800000008 *
8

DO NOT WRITE IN THIS MARGIN


,  ,

6 Smartphones and desktop computers can be used to play video games.

Discuss the advantages and disadvantages of using a smartphone rather than a desktop computer
to play video games.

Advantages: Smartphones are more portable therefore can play the game in different
..................................................................................................................................................
places
More varieties of games as the smartphone is more likely to be used
..................................................................................................................................................

..................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


Disadvantages: Smaller screen makes it difficult to see the content of the game
..................................................................................................................................................
Smaller controls makes it more difficult to use
Drains the battery more on the smartphone
..................................................................................................................................................
Desktop computers not reliant on batteries
Takes up more of the processing power of a smartphone meaning that
..................................................................................................................................................
hardware intensive games not used
The game can be interrupted more due to the functions of the phone
..................................................................................................................................................
The smartphone is more likely to be with the user therefore there can be more
..................................................................................................................................................
issues with gambling
Excessive use of the smartphone can lead to more health issues
..................................................................................................................................................
As storage is smaller on a smartphone the game can take up a lot of storage
space some games cannot be downloaded / run on a smartphone

DO NOT WRITE IN THIS MARGIN


..................................................................................................................................................
Causes distractions which could lead to injury

..................................................................................................................................................

.................................................................................................................................................. [6]

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN

© UCLES 2024 ĬÚ÷Àĝ´íÉóÑĢÍĊÀúµÿ× 11_0417_13_2024_1.9


ĬÎÆāÃčÌØÝ÷ĀÊÂæĕÖÂĂ
ĥåĥÕõµąµååÕĕååÅĕĕÕ
* 0000800000009 *
9
DO NOT WRITE IN THIS MARGIN

,  ,

7 Schools can use School management systems.

(a) Describe the inputs, processing and outputs required by a School management system to
show learner performance.
Inputs
...........................................................................................................................................
Student personal details
Marks and grades
...........................................................................................................................................
Student behaviour
Student test results
...........................................................................................................................................
Attendance data
DO NOT WRITE IN THIS MARGIN

Punctuality data
...........................................................................................................................................

Processing
...........................................................................................................................................
Average grades are calculated
Comparison made with forecast grades
...........................................................................................................................................
Class averages are created
...........................................................................................................................................
Data is saved
Graphs are created
...........................................................................................................................................
Outputs
...........................................................................................................................................
Termly/yearly reports are printed / sent to parents
Progress against forecast grades are printed / sent
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................
Statistical analysis is produced

...........................................................................................................................................

........................................................................................................................................... [6]

(b) Computer Aided Learning (CAL) can be part of a School management system.

Explain what is meant by Computer Aided Learning.


It is a method of learning
...........................................................................................................................................
It is an application / software / program
DO NOT WRITE IN THIS MARGIN

Used to help students to learn about a subject


...........................................................................................................................................
It is tailored to the individual student
It can take account of previous assessments when setting learning objectives
...........................................................................................................................................

........................................................................................................................................... [2]
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 ĬÜ÷Àĝ´íÉóÑĢÍĊÀüµÿ×


ĬÎÅĂËěÈèÜāñÿĖÎÁÖ²Ă
11_0417_13_2024_1.9 [Turn over
ĥåĕĕµÕĥÕµÕąĕåÅåÕąÕ
* 0000800000010 *
10

DO NOT WRITE IN THIS MARGIN


, ,

8 The manager of a plant nursery has asked a systems analyst to create a new database system to
store information about his plants. This new database system needs to store the following data.

• the unique reference number for each plant


• the common name for each plant
• if the plant is scented or non-scented
• the price of each plant on a range from $10 to $100
• the maximum height of the plant in metres

Part of the database is shown:

DO NOT WRITE IN THIS MARGIN


Ref_No Name_of_plant Scented Price ($) Height (m)

HT134 Rose Peace S 12.99 1.20

WO016 White Oak N 98.00 5.24

SP345 Spindle Tree S 25.99 9.00

(a) For each of the fields shown, state and describe the most appropriate validation check that
could be used on the data. Your answers must be different in each case.

(i) Ref_No

DO NOT WRITE IN THIS MARGIN


Format check
The data must be in the format LLNNN
Validation check ....................................................................................................
Length Check
Description ............................................................................................................
The data must contain 5 characters
................................................................................................................................
Presence check
The field must contain data / cannot be null [2]

(ii) Price ($)

Validation check Range check


....................................................................................................

DO NOT WRITE IN THIS MARGIN


The price must be in the range of 10–100
Description ............................................................................................................
Type / character check
................................................................................................................................
The field only contains number
[2]
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 ĬÚ÷Àĝ´íÉóÑĢÍĊ½ú·ý× 11_0417_13_2024_1.9


ĬÎÇāÊďÄÂãðćĤÞèñкĂ
ĥõąĕõµåµąĕÕÕåąÅĕåÕ
* 0000800000011 *
11
DO NOT WRITE IN THIS MARGIN

, ,

(b) In the table, state the most appropriate data types to create the database using the information
given before. For any numeric field, specify the type of number.

Field name Data type

Name_of_plant Alphanumeric

Scented Boolean

Price ($) Numeric: currency


DO NOT WRITE IN THIS MARGIN

Height (m) Numeric: decimal

[4]

9 (a) Circle two web development layers.

Behaviour Body CSS Display


DO NOT WRITE IN THIS MARGIN

Head HTML Presentation Surface

[2]

(b) Explain why tables are used to structure elements within a web page.

They restrict the output so that the display remains constant / fixed Different
...........................................................................................................................................
browsers should render the table in the same way
The tables are independent of the screen resolution
...........................................................................................................................................
Organises the data on the web page
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

........................................................................................................................................... [2]
DO NOT WRITE IN THIS MARGIN

© UCLES 2024 ĬÜ÷Àĝ´íÉóÑĢÍĊ½ü·ý×


ĬÎÈĂÂęÀ²ÖĊúåúÐåĞÊĂ
11_0417_13_2024_1.9 [Turn over
ĥõõÕµÕÅÕĕĥąÕåĥåÕµÕ
* 0000800000012 *
12

DO NOT WRITE IN THIS MARGIN


, ,

10 A gesture based user interface can be used in gaming devices to play games.

Describe the benefits and drawbacks of using a gesture based interface in this scenario.
Benefits: The screen lasts longer as no physical contact with the user
..................................................................................................................................................
Natural form of communication which makes the game more realistic
Fast form of data entry
..................................................................................................................................................
Do not require additional devices
The screen display is free of buttons
..................................................................................................................................................

..................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


Drawbacks: Reduced commands
..................................................................................................................................................
Commands have to be learnt correctly
Causes fatigue
..................................................................................................................................................
Immersion syndrome
Distinct physical actions needed as gestures can be mistaken
..................................................................................................................................................
The device can be triggered accidentally
If the system is too complex more gestures have to be learnt
..................................................................................................................................................
Uses more processing power
..................................................................................................................................................
Requires a good camera
More physical space needed
..................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


..................................................................................................................................................

.................................................................................................................................................. [6]

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2024 ĬÚ÷Àĝ´íÉóÑĢÍĊ¿ú·ÿ× 11_0417_13_2024_1.9


ĬÎÈăÂē®·áĈñÞÜôćî²Ă
ĥÅåÕõÕÅõõÅõÕĥĥąÕåÕ

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy