0478 s23 QP 12 Merged
0478 s23 QP 12 Merged
* 8 1 0 7 6 2 2 0 5 5 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (EF) 313966/2
© UCLES 2023 [Turn over
2
10010011 ..................................................................................................................................
00001101 ..................................................................................................................................
[4]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
0 1 1 1 1 0 1 0
(i) Complete the binary register to show its contents after this logical right shift.
[1]
(ii) State one effect this logical shift has on the binary number.
...........................................................................................................................................
..................................................................................................................................... [1]
(c) Give two reasons why a programmer may use hexadecimal to represent binary numbers.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 When keys are pressed on a keyboard, the text is converted to binary to be processed by the
computer.
(a) Describe how the text is converted to binary to be processed by the computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Text that is input into a computer can be stored in a text file.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(iii) Give two reasons why the text file may have been compressed.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
The student needs to transmit the photographs to their computer. They could use serial data
transmission or parallel data transmission to transmit the photographs.
(a) (i) Describe how the photographs would be transmitted using serial data transmission.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Give two benefits of transmitting the photographs using serial data transmission.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(iii) State one benefit of the student using parallel data transmission instead of serial data
transmission.
...........................................................................................................................................
..................................................................................................................................... [1]
(b) The photographs are also transmitted across a network to cloud storage. A device on the
network forwards the data towards its correct destination.
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(iii) Give one disadvantage of storing the photographs in cloud storage instead of storing
them locally.
...........................................................................................................................................
..................................................................................................................................... [1]
© UCLES 2023 0478/12/M/J/23 [Turn over
6
(a) Tick (3) one box to show which statement is correct about writing computer programs in a
high‑level language.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(c) The programmer uses an integrated development environment (IDE) to create the computer
program.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
Some of the terms in the list will not be used. Some terms may be used more than once.
secondary storage.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
[6]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(c) Give two security solutions that can be used to help prevent a DDoS attack being successful.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(a) Tick (3) one box to show which device would assign the IPv4 address to the computer.
C Router
D Web server
[1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
10 A user has both system software and application software installed on their computer.
(a) Describe the difference between system software and application software.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) State which component in the computer would store both types of software when the power is
turned off.
............................................................................................................................................. [1]
BLANK PAGE
Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CJ) 313967/3
© UCLES 2023 [Turn over
2
............................................................................................................................................. [1]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(c) A logical left shift of three places is performed on the binary number.
(i) Give the 8-bit binary number that would be stored after this logical left shift.
..................................................................................................................................... [1]
(ii) Tick (3) one box to show which statement is true about the impact the logical left binary
shift would have on the binary number.
(d) Add the two 8-bit binary numbers 11101110 and 00110001 using binary addition.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Calculate the least number of bits that can be used to store the denary number 301.
............................................................................................................................................. [1]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Calculate the least number of bits that can be used to store the hexadecimal number A4D.
............................................................................................................................................. [1]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 A library has a self-checkout system that allows customers to register books that they want to
borrow.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) The CPU is replaced with one that has four cores.
Explain the effect this has on the performance of the self-checkout system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Identify one bus that can be found in the CPU and explain its purpose in the
fetch–decode–execute cycle.
Bus ....................................................................................................................................
Purpose .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(d) The self-checkout system allows the user to input their library membership number.
Give two appropriate input devices that would allow the user to do this.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(e) The self-checkout system uses a monitor to display information about the book.
Users who are blind also need to use the self-checkout system.
Give an appropriate output device that would allow a blind user to be given this information.
............................................................................................................................................. [1]
Circle two types of primary storage that would be used in the system.
read only memory (ROM) universal serial bus (USB) flash memory drive
[2]
(g) The self-checkout system is linked to a stock control system that is updated every time a
book is borrowed from the library.
Explain the role of the microprocessor in this system and how it is used to update the stock
when a book is borrowed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Term Definition
.............................................................................................
.............................................................................................
router
.............................................................................................
.............................................................................................
.............................................................................................
.............................................................................................
network interface card (NIC)
.............................................................................................
.............................................................................................
(a) Tick (3) one box to show which statement is a benefit of writing a program in a high-level
language, instead of a low-level language.
(b) Translators are used to translate the high-level language so that it can be processed by the
computer.
..................................................................................................................................... [1]
(ii) One translator converts and executes the code line by line.
..................................................................................................................................... [1]
(iii) One translator creates an error report displaying all the errors in the code before it can
be executed.
..................................................................................................................................... [1]
..................................................................................................................................... [1]
5 Complete and annotate the diagram to demonstrate how packet switching is used to transmit data
across a network, including the use of routers, from Device A to Device B.
Device A Device B
[4]
6 A student is writing a help guide about how to recognise and avoid the cyber-security threat of
pharming.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(b) The student also wants to include information in the help guide about the use of social
engineering as a cyber-security threat.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) The student includes information about the security solution of access levels.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
7 The rule base and the inference engine are two components of an expert system.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Some of the terms in the list will not be used. You should only use a term once.
When the attacker wants the DDoS to take place, repeated requests are simultaneously sent from
this hardware.
[5]
9 A device can be given an internet protocol (IP) address. This can be an IPv4 or IPv6.
...................................................................................................................................................
............................................................................................................................................. [1]
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(i) Identify the system that stores a database of uniform resource locators (URLs) and their
corresponding IP addresses.
..................................................................................................................................... [1]
(ii) Identify the software that sends a request to the IP address to obtain the web page data.
..................................................................................................................................... [1]
10 A computer has pages A, B and C that are stored in RAM. Page D needs to be sent to the RAM
but the RAM is full.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
(a) State the name of the software that can do these tasks.
............................................................................................................................................. [1]
(b) Give one task that the software allows the user to do to manage files.
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
............................................................................................................................................. [1]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CJ) 329154/3
© UCLES 2024 [Turn over
2
(a) Identify two input devices that could be built into the portable tablet computer.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Identify one output device that could be built into the portable tablet computer.
............................................................................................................................................. [1]
(c) Identify one type of storage device that could be built into the portable tablet computer.
............................................................................................................................................. [1]
(a) Tick (3) one box to show which statement about the hexadecimal number system is incorrect.
C It is a base 10 system.
20 ..............................................................................................................................................
32 ..............................................................................................................................................
165 ............................................................................................................................................
[3]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(a) Give the 8-bit binary number that will be stored after the shift has taken place.
............................................................................................................................................. [1]
(b) Tick (3) one box to show which statement about a logical left shift of two places is correct.
Convert the two’s complement integer 10100011 to denary. Show all your working.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
............................................................................................................................................. [1]
4 Data packets are transmitted across a network from one computer to another computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Packet switching is used to transmit the data packets across the network.
Identify the device that controls which path is taken by each data packet.
............................................................................................................................................. [1]
(c) Serial data transmission is used to transmit the data packets across the network.
Explain why serial data transmission is used to transmit the data packets.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
5 A computer uses both random access memory (RAM) and secondary storage.
...................................................................................................................................................
............................................................................................................................................. [1]
read only memory (ROM) secure digital (SD) card compact disk (CD)
Blu-ray disk universal serial bus (USB) drive solid-state drive (SSD)
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(d) The computer processes instructions using the fetch–decode–execute (FDE) cycle.
Draw and annotate a diagram to show the process of the fetch stage of the FDE cycle.
[4]
...................................................................................................................................................
............................................................................................................................................. [1]
............................................................................................................................................. [1]
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
Some of the terms in the list will not be used. You should only use a term once.
.............................................................. . [4]
BLANK PAGE
...................................................................................................................................................
............................................................................................................................................. [1]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(c) The robot plants seeds and stops when it reaches a fence. It then turns and continues planting
seeds. The robot uses sensors and a microprocessor to know when it reaches a fence.
Explain how the robot uses sensors and a microprocessor to know it has reached a fence.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(d) Give two advantages of the farmer using an automated robot to plant seeds.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(e) Give two disadvantages of the farmer using an automated robot to plant seeds.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
9 A company owner has installed a new network. Data is correct before it is transmitted across the
network.
The company owner is concerned that data might have errors after transmission.
(a) Explain how the data might have errors after transmission.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) The company owner decides to introduce an error detection system to check the data for
errors after transmission.
The error detection system uses an odd parity check and a positive automatic repeat query
(ARQ).
(i) Describe how the error detection system operates to check for errors.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [8]
© UCLES 2024 0478/11/M/J/24
11
(ii) Give two other error detection methods that could be used.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(c) The company owner also installs a firewall to help protect the network from hackers and
malware.
(i) Explain how the firewall operates to help protect the network.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
(ii) Give two examples of malware that the firewall can help protect the network from.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Cambridge IGCSE™
¬Wz> 3mG{M¡=iVW
¬a=¤IzUrsTa_
¥ eU5Ue5EUe¥ uU
* 8 4 8 6 8 9 2 6 8 8 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (KS) 329152/4
© UCLES 2024 [Turn over
* 0019654976302 *
(a) Give the name of the data storage measurement that is equal to 8 bits.
............................................................................................................................................. [1]
............................................................................................................................................. [1]
(c) Give the name of the data storage measurement that is equal to 1024 gibibytes (GiB).
(d) A 16-bit colour image has a resolution of 512 pixels wide by 512 pixels high.
Calculate the file size of the image in kibibytes (KiB). Show all your working.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(a) Tick (3) one box to show which of the terms is not a method for transmitting data.
B simplex
C parallel
D parity
[1]
(b) Data is broken down into smaller units to be transmitted from one device to another.
DO NOT WRITE IN THIS MARGIN
Give the name of the unit that data is broken down into.
............................................................................................................................................. [1]
ĬÕú¾Ġ³íÇûÍġ½ĞìĈØĎ×
© UCLES 2024 ĬĖěâÀĨ½ĐÞÿôĐĬößęçĂ
ĥÕµÕõµĥÕõÕąÕååĥÕÕÕ
0478/12/M/J/24
* 0019654976303 *
DO NOT WRITE IN THIS MARGIN
3
, ,
(c) Data is often encrypted when it is transmitted from one device to another.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
..................................................................................................................................... [1]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
Ĭ×ú¾Ġ³íÇûÍġ½ĞìĆØĎ×
© UCLES 2024 ĬĖĜáÈĢÁĠÛùýÙ°þûę×Ă
ĥÕÅĕµÕąµĥåÕÕåÅąĕÅÕ
0478/12/M/J/24 [Turn over
* 0019654976304 *
(a) Give the name of the number system that is base 16.
............................................................................................................................................. [1]
(b) Three denary numbers are entered into a computer. The computer converts the numbers and
stores them as binary.
(i) Give the binary number that would be stored for each of the denary numbers.
50 ......................................................................................................................................
201 ....................................................................................................................................
[3]
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(c) The two binary integers 00110000 and 01100110 are added together.
Add the binary integers using binary addition and show your answer in binary. Show all your
working.
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
ĬÕú¾Ġ³íÇûÍġ½ĞêĈØĐ×
© UCLES 2024 ĬĖĜäÈĬ³ĩà÷ĆÒĎâÙĉßĂ
ĥĥĕĕõÕąĕąąåÕĥÅåĕÕÕ
0478/12/M/J/24
* 0019654976305 *
DO NOT WRITE IN THIS MARGIN
5
, ,
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
............................................................................................................................................. [2]
4 A student uses both system software and application software on their computer.
............................................................................................................................................. [1]
DO NOT WRITE IN THIS MARGIN
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(c) Describe the difference between system software and application software.
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
DO NOT WRITE IN THIS MARGIN
Ĭ×ú¾Ġ³íÇûÍġ½ĞêĆØĐ×
© UCLES 2024 ĬĖěãÀЯęÙāûėÊÚýĉÏĂ
ĥĥĥÕµµĥõĕõõÕĥåÅÕÅÕ
0478/12/M/J/24 [Turn over
* 0019654976306 *
(a) Complete the paragraph about fetching an instruction into the CPU to be processed.
Some of the terms in the list will not be used. You should only use a term once.
...................................................................................................................................................
............................................................................................................................................. [1]
DO NOT WRITE IN THIS MARGIN
ĬÙú¾Ġ³íÇûÍġ½ĞëĆÕĎ×
© UCLES 2024 ĬĖĜãÃĨ×ēÑĆĊĞêâĠáßĂ
ĥµÅÕµĕĥÕÕĕÕÕååĥĕĕÕ
0478/12/M/J/24
* 0019654976407 *
DO NOT WRITE IN THIS MARGIN
7
, ,
Complete the table by giving the correct error detection method for each statement.
is transmitted.
7 A computer has both a media access control (MAC) address and an internet protocol (IP) address.
(a) Tick (3) one box to show which of the statements is correct about the MAC address.
B It is assigned by a router.
..................................................................................................................................... [1]
1 ........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
ĬÛù¿Ġ³íÇûÍġ½ĞìĆÕĎ×
© UCLES 2024 ĬĖĜáÀīèõâćöÙđĢĠđ×Ă
ĥąĥĕµµÅµµĕõÕĥĥĥÕåÕ
0478/12/M/J/24 [Turn over
* 0019654976408 *
8 A company has a website that is suffering a distributed denial of service (DDoS) attack.
(a) Draw and annotate a diagram to show the process of the DDoS.
(b) Identify a solution that can be used to help prevent the DDoS attack being successful.
............................................................................................................................................. [1]
ĬÙù¿Ġ³íÇûÍġ½ĞêĈÕĐ×
© UCLES 2024 ĬĖĜäÀġÖôÕĉíÒ³¾¾āßĂ
ĥµµĕõµÅĕÕµąÕåĥÅÕµÕ
0478/12/M/J/24
* 0019654976409 *
DO NOT WRITE IN THIS MARGIN
9
, ,
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
DO NOT WRITE IN THIS MARGIN
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
[6]
DO NOT WRITE IN THIS MARGIN
ĬÛù¿Ġ³íÇûÍġ½ĞêĆÕĐ×
© UCLES 2024 ĬĖěãÈħÚĄäïĄėħ¶ĚāÏĂ
ĥµÅÕµÕåõÅÅÕÕåąåĕåÕ
0478/12/M/J/24 [Turn over
* 0019654976410 *
10 A garage uses an expert system to help diagnose any problems with cars that need repair.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(b) A car has a problem with its braking system, so it is brought into the garage.
Explain how the expert system operates and how it is used to help diagnose the problem.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
ĬÙù¿Ġ³íÇûÍġ½ĞëĈ×Ď×
© UCLES 2024 ĬĖęäÅģÎĦÛĂöüÏÀê¹×Ă
ĥĥÕÕõµĥĕõąąĕåÅÅÕąÕ
0478/12/M/J/24
* 0019654976411 *
DO NOT WRITE IN THIS MARGIN
11
, ,
11 A company has a website. Users use the internet and the world wide web to access the website.
(a) Describe the difference between the internet and the world wide web.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
DO NOT WRITE IN THIS MARGIN
(b) The website has a uniform resource locator (URL). The URL has three different parts.
Identify the three different parts that are included in the URL.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
DO NOT WRITE IN THIS MARGIN
(c) One function of a web browser is to provide an address bar for a user to enter a URL.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
ĬÛù¿Ġ³íÇûÍġ½ĞëĆ×Ď×
© UCLES 2024 ĬĖĚã½ĥÒĖÞøċċ¸î¹çĂ
ĥĥåĕµÕąõĥõÕĕåååĕĕÕ
0478/12/M/J/24
* 0019654976412 *
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
ĬÙù¿Ġ³íÇûÍġ½ĞéĈ×Đ×
© UCLES 2024 ĬĖĚâ½ğäēÙúĄ¶éĜÐéÏĂ
ĥÕõĕõÕąÕąÕåĕĥåąĕąÕ
0478/12/M/J/24
Cambridge IGCSE™
* 2 0 8 1 7 4 3 8 5 1 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CE) 329144/3
© UCLES 2024 [Turn over
2
............................................................................................................................................. [1]
(b) State how many kibibytes (KiB) there are in 2 mebibytes (MiB).
............................................................................................................................................. [1]
............................................................................................................................................. [1]
2 An image has a 16-bit colour depth and a resolution of 1000 × 1750 pixels.
...................................................................................................................................................
............................................................................................................................................. [1]
Give the effect this will have on the file size of the image.
...................................................................................................................................................
............................................................................................................................................. [1]
The programmer needs to debug the program. To do this they need to look at addresses that are
locations in memory.
..................................................................................................................................... [3]
..................................................................................................................................... [1]
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
..................................................................................................................................... [1]
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(c) Give one reason why the addresses are displayed in hexadecimal instead of binary.
...................................................................................................................................................
............................................................................................................................................. [1]
(d) Identify two other ways that hexadecimal is used in computer science.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(e) The health value for a character in the computer game can sometimes be a negative value.
The negative values are stored as two’s complement 8-bit integers.
Calculate the two’s complement 8-bit integer for –25. Show all your working.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Complete the table by writing the correct type of secondary storage for each statement.
................................................. Platters are spun that are divided into tracks and sectors.
[6]
5 A computer uses both random access memory (RAM) and read only memory (ROM).
(a) Tick (3) one box to show which statement is correct about RAM.
A It is non-volatile storage.
...................................................................................................................................................
............................................................................................................................................. [1]
6 A sensor is an input device that is used to capture data from its surrounding environment.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(c) The table contains different types of sensors and a use for each.
Complete the table by giving a suitable use for each type of sensor. The first one has been
done for you.
to monitor whether a water pipe has cracked and is leaking and dripping
acoustic
onto the floor
................................................................................................................
temperature
................................................................................................................
................................................................................................................
................................................................................................................
humidity
................................................................................................................
................................................................................................................
................................................................................................................
infra-red
................................................................................................................
................................................................................................................
................................................................................................................
magnetic field
................................................................................................................
................................................................................................................
[4]
Data is transmitted across the network using serial half-duplex data transmission.
(a) Draw and annotate a diagram to show how the data is transmitted using serial half-duplex
data transmission.
[4]
(b) Give two benefits of the company using serial half-duplex data transmission for this purpose.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(c) Give one drawback of the company using serial half-duplex data transmission for this
purpose.
...................................................................................................................................................
............................................................................................................................................. [1]
(d) The company uses a proxy server to help protect the web server and the network from cyber
security threats.
(i) Give three cyber security threats that the proxy server can help protect against.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(ii) Identify two functions of the proxy server that can be used to help protect the web server
and the network.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(e) Customers access the company’s web pages that are stored on the web server.
Describe how the web pages are located, retrieved and displayed on a customer’s computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Give three registers that are built into the CPU.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(c) One component in the CPU is the arithmetic logic unit (ALU).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(d) The student wants to replace the CPU to increase the performance of the computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
9 A printer runs out of ink and needs a new ink cartridge. An interrupt is sent and a message is
generated to notify the user that the ink cartridge is empty.
(a) Complete the paragraph about the use of an interrupt in this process.
Some of the terms in the list will not be used. You should only use a term once.
the current task and fetches the interrupt. It then calls the
handles the interrupt. The interrupt is handled, which generates a message to the user to
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (EF) 313505/3
© UCLES 2023 [Turn over
2
A Software that activates a webcam and transmits the video to a third party
that outputs it live on a website.
B Software that detects when a password is being entered and then emails
the password to a third party.
C Software that records all data entered into a computer, analyses this data
to find email addresses and passwords, then posts these to a website.
D Software that records all key presses and transmits these to a third party.
[1]
(b) Complete the table by identifying and describing two other examples of malware.
Malware Description
...........................................................................................................
...........................................................................................................
......................................
1 ...........................................................................................................
......................................
...........................................................................................................
...........................................................................................................
...........................................................................................................
...........................................................................................................
......................................
2 ...........................................................................................................
......................................
...........................................................................................................
...........................................................................................................
[6]
Identify two similarities and one difference between proxy‑servers and firewalls.
Similarity 1 ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Similarity 2 ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Difference .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
2 A programmer has designed a three‑dimensional (3D) interactive computer game. They are going
to develop a program for the game. The program needs to run efficiently, but it must also be
developed as soon as possible.
(a) Tick (✓) one box to identify whether the programmer should use a high‑level language or a
low‑level language to develop the program.
High‑level language
Low‑level language
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) If the programmer chooses a high‑level language, they can use a compiler or an interpreter to
translate the high‑level language into a low‑level language.
Compiler ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Interpreter .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...................................................................................................................
pixel ...................................................................................................................
...................................................................................................................
...................................................................................................................
resolution ...................................................................................................................
...................................................................................................................
[2]
(b) One of the images has a resolution of 1000 × 1000 and a colour depth of 2 bytes.
Calculate the file size of the image. Give your answer in bytes.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(c) The photographer decides to purchase a solid‑state storage device to back up their images.
Some of the terms in the list will not be used. You should only use a term once.
........................................................... .
Gates are used to control the flow of the ........................................................... through the
...................................................................................................................................................
............................................................................................................................................. [1]
The structure of a packet of data has three elements. One element is the packet header.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(b) Computer A needs to be directly connected to a router that is located in a different room.
(i) Tick (✓) one box to identify whether serial data transmission or parallel data transmission
is more suitable for this connection.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(i) The bytes need to be sent using an even parity byte check.
Parity
bit
Byte A 1 1 0 0 0 1 1
Byte B 0 0 0 0 0 0 0
[2]
(ii) A parity block check can be used instead of a parity byte check.
Explain how a parity block check might detect an error in transmission that would not be
detected by a parity byte check.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(iii) The data was sent using an even parity block check. One of the bits has been transmitted
incorrectly.
Parity
Bit 1 Bit 2 Bit 3 Bit 4 Bit 5 Bit 6 Bit 7
bit
Byte 0 1 1 1 0 1 0 0 0
Byte 1 0 0 1 0 0 1 0 0
Byte 2 1 0 1 1 0 0 0 1
Byte 3 1 1 0 0 1 1 1 1
Byte 4 1 0 1 0 0 0 1 0
Byte 5 0 0 0 0 0 0 0 0
Byte 6 0 1 1 1 1 0 0 0
Parity
0 1 1 0 1 0 1 0
byte
Identify the bit number and the byte number of the incorrect bit.
(d) The website allows the user to set up an account to log on and purchase items. The website
is accessed and displayed using a web browser.
(i) Two functions of the web browser are to render hypertext markup language (HTML) to
display web pages and to store cookies.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(ii) Identify two ways that cookies can be used to enhance the user’s experience of this
website.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
One of its robots is designed to make a specific movement depending on a binary value.
(a) The table gives some of the movements for the robot.
Complete the table by writing the missing binary, denary or hexadecimal value for each
movement.
[4]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
The robot will move forward continuously until it detects an object that is less than or equal to
10 cm in front of it.
If an object is less than or equal to 10 cm in front of it, the robot turns 90 degrees right. It then
tries to move forward again.
Explain how the sensor and the microprocessor are used to automate this robot.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [7]
(d) The robot needs to find its way through different puzzles. Each puzzle has a series of paths
that the robot needs to follow to find its way to the end of the puzzle. The puzzle contains
dead ends and obstacles, so the robot needs to decide which way to go.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
BLANK PAGE
Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (DE) 327909/3
© UCLES 2024 [Turn over
2
(a) Tick (✓) one box to show the reason why computers use binary to represent data.
B Computers are made of switches and gates that can only be on or off.
C Binary does not need to be converted into other forms of data to be displayed.
The American standard code for information interchange (ASCII) denary number for the
character ‘N’ is 78.
(i) Tick (✓) one box to identify the ASCII denary number for the character ‘Q’.
A 81
B 80
C 79
D 77
[1]
(ii) Give the binary number for the ASCII denary number for ‘N’.
..................................................................................................................................... [1]
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(iii) Explain how the word ‘RED’ is represented using a character set.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
© UCLES 2024 0478/12/F/M/24
3
(i) Explain why recording sound with a higher sampling resolution creates a more accurate
recording.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Give one other way that the accuracy of a sound recording can be improved.
...........................................................................................................................................
..................................................................................................................................... [1]
(a) The table contains five statements about the role of registers in the fetch–decode–execute
cycle of a CPU.
Letter Statement
A PC stores the address of the next instruction to be accessed
B MAR stores the instructions of the program that is running
C MDR stores the data passed to it from the PC
D ACC stores the result of each calculation
E CIR stores the instruction currently being executed
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(b) The computer has a single core 3.5 GHz processor and an 8 kB cache.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Read only memory (ROM) is another example of primary storage. ROM often stores the
start-up instructions for a computer.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
..................................................................................................................................... [1]
(a) Complete the table by writing each missing OS function name and description.
……………………………………………………………………………
……………………………………………………………………………
managing memory
……………………………………………………………………………
……………………………………………………………………………
……………………................…
allows application software to run on the computer
……………………................…
……………………………………………………………………………
……………………………………………………………………………
managing peripherals
……………………………………………………………………………
……………………………………………………………………………
[3]
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Identify one input device and one example of an interrupt that it can generate.
Interrupt .............................................................................................................................
[1]
Explain how the processor manages the current program and the interrupt.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
4 A student enters a uniform resource locator (URL) into their web browser.
Draw and annotate a diagram to show the process from the user entering the URL to the web
browser displaying the web page.
[5]
transaction-chains virtually
electronically.
These are decentralised databases where each transaction is stored as a new set of data with
a ........................................................... and is linked to the previous set of data. This means that
transactions cannot be altered, only new transactions added, which allows the location of the data
to be ........................................................... .
[4]
6 A self-driving tractor sows seeds and harvests crops for a farmer. The self-driving tractor moves
automatically through the field, turning at each end and stopping when it has finished.
(a) One reason the self-driving tractor is a robot is because it has a mechanical structure that
includes wheels, an engine, and a framework.
Give one other reason why the self-driving tractor is an example of a robot.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) If a person is detected within 3 metres whilst the tractor is moving, the self-driving tractor
must stop.
(i) Explain how an infra-red sensor, microprocessor and actuator can be used to stop the
self-driving tractor if a person is detected within 3 metres.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
(ii) Identify one other sensor that the self-driving tractor might use and how it will use the
sensor.
Sensor ...............................................................................................................................
Use ....................................................................................................................................
...........................................................................................................................................
[2]
(c) Explain the drawbacks of a farmer using a self-driving tractor to sow seeds and harvest crops.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(d) The self-driving tractor has an in-built expert system that the farmer can use to solve any
errors with the tractor.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(e) At the end of each day the self-driving tractor transmits the data it has collected to the farmer’s
computer in their house.
(i) Describe the role of the self-driving tractor and the farmer’s computer in the echo check.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
The table shows 7 bytes that are transmitted using odd parity. The parity bit has been
completed for each byte.
parity
bit 7 bit 6 bit 5 bit 4 bit 3 bit 2 bit 1
bit
byte 1 1 1 0 0 1 1 1 0
byte 2 1 0 0 0 0 1 1 0
byte 3 0 1 0 0 0 0 0 0
byte 4 0 1 0 0 1 1 1 1
byte 5 1 0 0 0 0 0 0 0
byte 6 0 1 1 1 1 1 1 1
byte 7 1 1 0 0 1 1 0 1
parity
byte
[3]
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
..................................................................................................................................... [1]
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(ii) Give one benefit of using hexadecimal instead of binary to represent data.
...........................................................................................................................................
..................................................................................................................................... [1]
(b) Two’s complement can be used to represent positive and negative binary integers.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Convert the denary number 45 into an 8-bit two’s complement integer.
...........................................................................................................................................
..................................................................................................................................... [1]
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
State the mathematical effect of a right shift of four places on a positive binary integer.
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (EF) 313965/2
© UCLES 2023 [Turn over
2
(a) Tick (3) one box to show which statement about the binary number system is correct.
A It is a base 1 system
B It is a base 2 system
C It is a base 10 system
D It is a base 16 system
[1]
50 ..............................................................................................................................................
102 ............................................................................................................................................
221 ............................................................................................................................................
[3]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Register:
[2]
00110011
+01100001
[3]
(e) Two binary numbers are added by a computer and an overflow error occurs.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
2 A student has a sound file that is too large to be stored on their external secondary storage device.
The student compresses the sound file to make the file size smaller.
The compression method used reduces the sample rate and the sample resolution of the sound
file.
(a) State what is meant by the sample rate and sample resolution.
...................................................................................................................................................
...................................................................................................................................................
[2]
(b) Identify which type of compression has been used to compress the sound file.
...................................................................................................................................................
............................................................................................................................................. [1]
(c) The student sends the sound file to a friend. The file is transmitted across a network that uses
packet switching.
(i) Identify two pieces of data that would be included in the header of each packet.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
hard disk drive (HDD) random access memory (RAM) read only memory (ROM)
[3]
(b) Tick (3) one box to show which statement about secondary storage is correct.
D It is volatile.
[1]
Some of the terms in the list will not be used. You should only use a term once.
the ........................................................................ .
[4]
5 A farm has an automated drinking system for its animals. The drinking system has a water bowl
that contains the water. When the water bowl is empty, it is automatically refilled.
............................................................................................................................................. [1]
(b) Describe how the sensor and the microprocessor are used to automatically refill the water
bowl.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(a) (i) Identify the component in the computer that is needed to access a network.
..................................................................................................................................... [1]
(ii) Identify the type of address that is allocated to the component by the manufacturer,
which is used to uniquely identify the device.
..................................................................................................................................... [1]
(b) A dynamic internet protocol (IP) address is allocated to the computer when it is connected to
the network.
(i) Identify the device on the network that can connect multiple devices and automatically
assign them an IP address.
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
7 A programmer uses a low‑level language to write a computer program for a vending machine.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Give two reasons why the programmer would choose to write the computer program in a
low‑level language instead of a high‑level language.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2023 0478/11/M/J/23 [Turn over
8
8 A manager at a company is concerned about a brute‑force attack on its employee user accounts.
(a) Describe how a brute‑force attack can be used to gain access to the employee user accounts.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) One possible aim for carrying out a brute‑force attack is to install malware onto the company
network.
(i) State two other aims for carrying out a brute‑force attack to gain access to the employee
user accounts.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(c) Give two security solutions that could be used to help prevent a brute‑force attack being
successful.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Give two advantages to company employees of using robots to manufacture large pieces of
furniture.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(c) Give one disadvantage to the company’s owners of using robots to manufacture large pieces
of furniture.
...................................................................................................................................................
............................................................................................................................................. [1]
10 A student uses the internet for their schoolwork to research what is meant by pharming.
...................................................................................................................................................
............................................................................................................................................. [1]
[4]
(c) The student uses a web browser to access data on the internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(e) A student visits a website that uses session cookies, instead of persistent cookies.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
BLANK PAGE
Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.