0% found this document useful (0 votes)
19 views104 pages

0478 s23 QP 12 Merged

This document is an examination paper for the Cambridge IGCSE Computer Science course, specifically Paper 1 on Computer Systems, for May/June 2023. It includes instructions for candidates, information about the total marks, and a variety of questions covering topics such as binary and hexadecimal conversions, data transmission, programming concepts, and computer components. The paper consists of 12 pages and requires candidates to answer all questions within a time limit of 1 hour and 45 minutes.

Uploaded by

kushjhun2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views104 pages

0478 s23 QP 12 Merged

This document is an examination paper for the Cambridge IGCSE Computer Science course, specifically Paper 1 on Computer Systems, for May/June 2023. It includes instructions for candidates, information about the total marks, and a variety of questions covering topics such as binary and hexadecimal conversions, data transmission, programming concepts, and computer components. The paper consists of 12 pages and requires candidates to answer all questions within a time limit of 1 hour and 45 minutes.

Uploaded by

kushjhun2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 104

Cambridge IGCSE™

* 8 1 0 7 6 2 2 0 5 5 *

COMPUTER SCIENCE 0478/12


Paper 1 Computer Systems May/June 2023

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (EF) 313966/2
© UCLES 2023 [Turn over
2

1 Output devices are used to output data from a computer.

Circle three devices that are output devices.

actuator digital versatile disk (DVD) keyboard

microphone mouse printer scanner

sensor solid‑state drive (SSD) speaker


[3]

2 Binary numbers can be converted to hexadecimal.

(a) Convert the two binary numbers to hexadecimal.

10010011 ..................................................................................................................................

00001101 ..................................................................................................................................
[4]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) A value is stored as a binary number in a register.

0 1 1 1 1 0 1 0

A logical right shift of three places is performed on the binary number.

(i) Complete the binary register to show its contents after this logical right shift.

[1]

(ii) State one effect this logical shift has on the binary number.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2023 0478/12/M/J/23


3

(c) Give two reasons why a programmer may use hexadecimal to represent binary numbers.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(d) Denary numbers can also be converted to hexadecimal.

Convert the denary number to hexadecimal.

301 ...................................................................................................................................... [2]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2023 0478/12/M/J/23 [Turn over


4

3 When keys are pressed on a keyboard, the text is converted to binary to be processed by the
computer.

(a) Describe how the text is converted to binary to be processed by the computer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Text that is input into a computer can be stored in a text file.

A text file can be compressed using lossless compression.

(i) State what effect this has on the file size.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Describe how lossless compression compresses the text file.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(iii) Give two reasons why the text file may have been compressed.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2023 0478/12/M/J/23


5

4 A student uses a mobile phone to take photographs for a school project.

The student needs to transmit the photographs to their computer. They could use serial data
transmission or parallel data transmission to transmit the photographs.

(a) (i) Describe how the photographs would be transmitted using serial data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Give two benefits of transmitting the photographs using serial data transmission.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(iii) State one benefit of the student using parallel data transmission instead of serial data
transmission.

...........................................................................................................................................

..................................................................................................................................... [1]

(b) The photographs are also transmitted across a network to cloud storage. A device on the
network forwards the data towards its correct destination.

(i) State the name of this device.

..................................................................................................................................... [1]

(ii) Describe what is meant by cloud storage.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) Give one disadvantage of storing the photographs in cloud storage instead of storing
them locally.

...........................................................................................................................................

..................................................................................................................................... [1]
© UCLES 2023 0478/12/M/J/23 [Turn over
6

5 A programmer writes a computer program using a high‑level language.

(a) Tick (3) one box to show which statement is correct about writing computer programs in a
high‑level language.

A Mnemonics are used to create instructions.

B The computer program is harder to debug than a low‑level language program.

C The computer program is machine independent.

D The hardware of the computer can be directly manipulated.


[1]

(b) The programmer uses a compiler to translate the computer program.

(i) Describe how the compiler translates the computer program.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) Describe how the compiler reports errors.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(c) The programmer uses an integrated development environment (IDE) to create the computer
program.

One function of the IDE is that it has the built‑in compiler.

Give three other common functions of an IDE.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2023 0478/12/M/J/23


7

6 (a) Complete the statements about cookies.

Use the terms from the list.

Some of the terms in the list will not be used. Some terms may be used more than once.

compression executable hypertext markup language (HTML)

hypertext transfer protocol (HTTP) image internet protocol (IP) address

persistent session sound text

uniform resource locater (URL) web browser web server

Cookies are small ........................................................... files that are sent between a

........................................................... and a ........................................................... .

........................................................... cookies are stored in memory and not in the user’s

secondary storage.

When the web browser is closed a ........................................................... cookie is lost,

whereas a ........................................................... cookie is not lost.


[6]

(b) Give three functions of a cookie.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2023 0478/12/M/J/23 [Turn over


8

7 A distributed denial of service attack (DDoS) is a cyber security threat.

(a) Draw and annotate a diagram to represent the process of a DDoS.

[6]

© UCLES 2023 0478/12/M/J/23


9

(b) State two aims of carrying out a DDoS attack.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(c) Give two security solutions that can be used to help prevent a DDoS attack being successful.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

8 A computer is connected to a network and assigned an IPv4 address.

(a) Tick (3) one box to show which device would assign the IPv4 address to the computer.

A Domain name server (DNS)

B Network interface card (NIC)

C Router

D Web server
[1]

(b) Describe the characteristics of an IPv4 address.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2023 0478/12/M/J/23 [Turn over


10

9 One component of an expert system is the inference engine.

(a) Identify the three other components in an expert system.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(b) Describe the role of the inference engine in an expert system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/12/M/J/23


11

10 A user has both system software and application software installed on their computer.

(a) Describe the difference between system software and application software.

Give an example of each software in your answer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) State which component in the computer would store both types of software when the power is
turned off.

............................................................................................................................................. [1]

© UCLES 2023 0478/12/M/J/23


12

BLANK PAGE

Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2023 0478/12/M/J/23


Cambridge IGCSE™
* 4 6 2 4 3 2 5 5 3 0 *

COMPUTER SCIENCE 0478/13


Paper 1 Computer Systems May/June 2023

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages.

DC (CJ) 313967/3
© UCLES 2023 [Turn over
2

1 Computers store data as binary. The binary number 10101110 is stored.

(a) Convert the binary number to denary.

............................................................................................................................................. [1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Convert the binary number to hexadecimal.

............................................................................................................................................. [2]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(c) A logical left shift of three places is performed on the binary number.

(i) Give the 8-bit binary number that would be stored after this logical left shift.

..................................................................................................................................... [1]

(ii) Tick (3) one box to show which statement is true about the impact the logical left binary
shift would have on the binary number.

A The least significant bits are lost.

B The most significant bits are lost.

C The number has been divided by six.

D The number stays the same.


[1]

© UCLES 2023 0478/13/M/J/23


3

(d) Add the two 8-bit binary numbers 11101110 and 00110001 using binary addition.

Give your answer in binary. Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(e) The denary number 301 needs to be stored.

Calculate the least number of bits that can be used to store the denary number 301.

............................................................................................................................................. [1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(f) The hexadecimal number A4D needs to be stored.

Calculate the least number of bits that can be used to store the hexadecimal number A4D.

............................................................................................................................................. [1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2023 0478/13/M/J/23 [Turn over


4

2 A library has a self-checkout system that allows customers to register books that they want to
borrow.

The self-checkout system has a central processing unit (CPU).

The CPU has two cores.

(a) State the purpose of a core in the CPU.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) The CPU is replaced with one that has four cores.

Explain the effect this has on the performance of the self-checkout system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) The CPU contains registers and buses.

(i) Describe the role of a register in the CPU.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Identify one bus that can be found in the CPU and explain its purpose in the
fetch–decode–execute cycle.

Bus ....................................................................................................................................

Purpose .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2023 0478/13/M/J/23


5

(d) The self-checkout system allows the user to input their library membership number.

Give two appropriate input devices that would allow the user to do this.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(e) The self-checkout system uses a monitor to display information about the book.

Users who are blind also need to use the self-checkout system.

Give an appropriate output device that would allow a blind user to be given this information.

............................................................................................................................................. [1]

(f) The self-checkout system uses two types of primary storage.

Circle two types of primary storage that would be used in the system.

compact disk (CD) digital versatile disk (DVD)

hard disk drive (HDD) random access memory (RAM)

read only memory (ROM) universal serial bus (USB) flash memory drive
[2]

(g) The self-checkout system is linked to a stock control system that is updated every time a
book is borrowed from the library.

A microprocessor is used in the stock control system to update the stock.

Explain the role of the microprocessor in this system and how it is used to update the stock
when a book is borrowed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2023 0478/13/M/J/23 [Turn over


6

3 Five network terms or definitions are given in the table.

Complete the table by giving the missing term or definition.

Term Definition

.............................................................................................

.............................................................................................
router
.............................................................................................

.............................................................................................

This address is assigned by the network and used to


identify a device on a network.
.............................................................

.............................................................................................

.............................................................................................
network interface card (NIC)
.............................................................................................

.............................................................................................

This address is assigned by the manufacturer and is used


to uniquely identify the device.
.............................................................

This can be hardware or software based and filters traffic


coming into and out of a network.
.............................................................
[5]

© UCLES 2023 0478/13/M/J/23


7

4 A programmer writes a computer program in a high-level language.

(a) Tick (3) one box to show which statement is a benefit of writing a program in a high-level
language, instead of a low-level language.

A The program can directly manipulate the hardware.

B The program is machine independent.

C The program is more memory efficient.

D The program is quicker to execute.


[1]

(b) Translators are used to translate the high-level language so that it can be processed by the
computer.

(i) State what the high-level language is translated into.

..................................................................................................................................... [1]

(ii) One translator converts and executes the code line by line.

Identify which type of translator would do this.

..................................................................................................................................... [1]

(iii) One translator creates an error report displaying all the errors in the code before it can
be executed.

Identify which type of translator would do this.

..................................................................................................................................... [1]

(iv) One translator creates an executable file.

Identify which type of translator would do this.

..................................................................................................................................... [1]

© UCLES 2023 0478/13/M/J/23 [Turn over


8

5 Complete and annotate the diagram to demonstrate how packet switching is used to transmit data
across a network, including the use of routers, from Device A to Device B.

Device A Device B

[4]

6 A student is writing a help guide about how to recognise and avoid the cyber-security threat of
pharming.

(a) Give three appropriate solutions he could include.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2023 0478/13/M/J/23


9

(b) The student also wants to include information in the help guide about the use of social
engineering as a cyber-security threat.

Describe what is meant by social engineering.

Include one example of social engineering in your answer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(c) The student includes information about the security solution of access levels.

Describe what is meant by access levels.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

7 The rule base and the inference engine are two components of an expert system.

(a) Identify the other two components of an expert system.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Describe the role of the rule base in an expert system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/13/M/J/23 [Turn over


10

8 Complete the statements about a distributed denial of service (DDoS) attack.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

anti-virus bot botnet hacker

internet malware secondary storage

spyware web browser web server website

The attacker encourages people to download ...................................................................... onto

their computer. This will turn each computer into a ...................................................................... ,

creating a network called a ...................................................................... .

When the attacker wants the DDoS to take place, repeated requests are simultaneously sent from

the computers to a ...................................................................... . This causes it to crash, meaning

that users can no longer access the ...................................................................... that is stored on

this hardware.
[5]

9 A device can be given an internet protocol (IP) address. This can be an IPv4 or IPv6.

(a) Give one similarity between IPv4 and IPv6.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Describe two differences between IPv4 and IPv6.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2023 0478/13/M/J/23


11

(c) A web page is requested using an IP address.

(i) Identify the system that stores a database of uniform resource locators (URLs) and their
corresponding IP addresses.

..................................................................................................................................... [1]

(ii) Identify the software that sends a request to the IP address to obtain the web page data.

..................................................................................................................................... [1]

10 A computer has pages A, B and C that are stored in RAM. Page D needs to be sent to the RAM
but the RAM is full.

Page B is not needed immediately.

Explain how virtual memory can be used in this scenario.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2023 0478/13/M/J/23 [Turn over


12

11 Software is installed on a computer to manage files, memory and multitasking.

(a) State the name of the software that can do these tasks.

............................................................................................................................................. [1]

(b) Give one task that the software allows the user to do to manage files.

............................................................................................................................................. [1]

(c) Describe what is meant by managing memory.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(d) A signal is sent within the computer to allow multitasking to occur.

State the name of this type of signal.

............................................................................................................................................. [1]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2023 0478/13/M/J/23


Cambridge IGCSE™
* 7 9 3 8 9 3 6 4 4 9 *

COMPUTER SCIENCE 0478/11


Paper 1 Computer Systems May/June 2024

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (CJ) 329154/3
© UCLES 2024 [Turn over
2

1 A student has a portable tablet computer.

(a) Identify two input devices that could be built into the portable tablet computer.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Identify one output device that could be built into the portable tablet computer.

............................................................................................................................................. [1]

(c) Identify one type of storage device that could be built into the portable tablet computer.

............................................................................................................................................. [1]

2 Hypertext markup language (HTML) colour codes can be represented as hexadecimal.

(a) Tick (3) one box to show which statement about the hexadecimal number system is incorrect.

A It uses the values 0 to 9 and A to F.

B It can be used as a shorter representation of binary.

C It is a base 10 system.

D It can be used to represent error codes.


[1]

(b) Denary numbers can be converted to hexadecimal.

Convert the three denary numbers to hexadecimal.

20 ..............................................................................................................................................

32 ..............................................................................................................................................

165 ............................................................................................................................................
[3]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2024 0478/11/M/J/24


3

3 The binary number 10100011 is stored in random access memory (RAM).

A logical left shift of three places is performed on the binary number.

(a) Give the 8-bit binary number that will be stored after the shift has taken place.

............................................................................................................................................. [1]

(b) Tick (3) one box to show which statement about a logical left shift of two places is correct.

A It would divide the binary number by 2.

B It would multiply the binary number by 2.

C It would divide the binary number by 4.

D It would multiply the binary number by 4.


[1]

(c) 10100011 can be stored as a two’s complement integer.

Convert the two’s complement integer 10100011 to denary. Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(d) The binary number is measured as a byte because it has 8 bits.

State how many bytes there are in a kibibyte (KiB).

............................................................................................................................................. [1]

© UCLES 2024 0478/11/M/J/24 [Turn over


4

4 Data packets are transmitted across a network from one computer to another computer.

(a) Describe the structure of a data packet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Packet switching is used to transmit the data packets across the network.

Identify the device that controls which path is taken by each data packet.

............................................................................................................................................. [1]

(c) Serial data transmission is used to transmit the data packets across the network.

Explain why serial data transmission is used to transmit the data packets.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2024 0478/11/M/J/24


5

5 A computer uses both random access memory (RAM) and secondary storage.

(a) State the purpose of secondary storage.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) One type of secondary storage is optical.

Circle three examples of optical storage.

read only memory (ROM) secure digital (SD) card compact disk (CD)

hard disk drive (HDD) digital versatile disk (DVD)

Blu-ray disk universal serial bus (USB) drive solid-state drive (SSD)
[3]

(c) Explain why a computer needs RAM.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(d) The computer processes instructions using the fetch–decode–execute (FDE) cycle.

Draw and annotate a diagram to show the process of the fetch stage of the FDE cycle.

[4]

© UCLES 2024 0478/11/M/J/24 [Turn over


6

6 A computer needs firmware and system software to operate.

(a) State the purpose of firmware.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Give one example of firmware.

............................................................................................................................................. [1]

(c) Give two examples of system software.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

7 Data is encrypted to keep it safe during transmission.

Complete the paragraph about asymmetric encryption.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

asymmetric certificate cipher text

decrypted encrypted parallel key plain text private key

protected public key serial key symmetric

.............................................................. is encrypted into ..............................................................

using a .............................................................. . The encrypted data is then transmitted from the

sender to the receiver. The encrypted data is then decrypted using a

.............................................................. . [4]

© UCLES 2024 0478/11/M/J/24


7

BLANK PAGE

© UCLES 2024 0478/11/M/J/24 [Turn over


8

8 A farmer uses an automated robot to plant seeds in the field.

(a) State what is meant by the robot being automated.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Give three characteristics of a robot.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

(c) The robot plants seeds and stops when it reaches a fence. It then turns and continues planting
seeds. The robot uses sensors and a microprocessor to know when it reaches a fence.

Explain how the robot uses sensors and a microprocessor to know it has reached a fence.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2024 0478/11/M/J/24


9

(d) Give two advantages of the farmer using an automated robot to plant seeds.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(e) Give two disadvantages of the farmer using an automated robot to plant seeds.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(f) The robot is adapted to have machine learning capabilities.

Explain how this will improve the robot.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2024 0478/11/M/J/24 [Turn over


10

9 A company owner has installed a new network. Data is correct before it is transmitted across the
network.

The company owner is concerned that data might have errors after transmission.

(a) Explain how the data might have errors after transmission.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) The company owner decides to introduce an error detection system to check the data for
errors after transmission.

The error detection system uses an odd parity check and a positive automatic repeat query
(ARQ).

(i) Describe how the error detection system operates to check for errors.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [8]
© UCLES 2024 0478/11/M/J/24
11

(ii) Give two other error detection methods that could be used.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(c) The company owner also installs a firewall to help protect the network from hackers and
malware.

(i) Explain how the firewall operates to help protect the network.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

(ii) Give two examples of malware that the firewall can help protect the network from.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

© UCLES 2024 0478/11/M/J/24


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2024 0478/11/M/J/24


* 0019654976301 *

,  ,

Cambridge IGCSE™

¬Wz> 3mG{M¡=ži†VW
¬–™a=¤IzUr†sT€a_‚
¥ eU5Ue5E•U•e¥ •uU
* 8 4 8 6 8 9 2 6 8 8 *

COMPUTER SCIENCE 0478/12


Paper 1 Computer Systems May/June 2024

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (KS) 329152/4
© UCLES 2024 [Turn over
* 0019654976302 *

DO NOT WRITE IN THIS MARGIN


2
,  ,

1 Data can be measured in bits.

(a) Give the name of the data storage measurement that is equal to 8 bits.

............................................................................................................................................. [1]

(b) State how many bits there are in a kibibyte (KiB).

............................................................................................................................................. [1]

(c) Give the name of the data storage measurement that is equal to 1024 gibibytes (GiB).

DO NOT WRITE IN THIS MARGIN


............................................................................................................................................. [1]

(d) A 16-bit colour image has a resolution of 512 pixels wide by 512 pixels high.

Calculate the file size of the image in kibibytes (KiB). Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

...................................................................................................................................................

Answer ......................................................... KiB


[3]

2 Data can be transmitted from one device to another.

(a) Tick (3) one box to show which of the terms is not a method for transmitting data.

DO NOT WRITE IN THIS MARGIN


A serial

B simplex

C parallel

D parity
[1]

(b) Data is broken down into smaller units to be transmitted from one device to another.
DO NOT WRITE IN THIS MARGIN

Give the name of the unit that data is broken down into.

............................................................................................................................................. [1]

ĬÕú¾Ġ³íÇûÍġ½ĞìĈØĎ×
© UCLES 2024 ĬĖěâÀĨ½ĐÞÿôĐĬößęçĂ
ĥÕµÕõµĥÕõÕąÕååĥÕÕÕ
0478/12/M/J/24
* 0019654976303 *
DO NOT WRITE IN THIS MARGIN

3
,  ,

(c) Data is often encrypted when it is transmitted from one device to another.

(i) Explain how data is encrypted using symmetric encryption.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) Give the purpose of encryption.

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

..................................................................................................................................... [1]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

Ĭ×ú¾Ġ³íÇûÍġ½ĞìĆØĎ×
© UCLES 2024 ĬĖĜáÈĢÁĠÛùýÙ°þûę×Ă
ĥÕÅĕµÕąµĥåÕÕåÅąĕÅÕ
0478/12/M/J/24 [Turn over
* 0019654976304 *

DO NOT WRITE IN THIS MARGIN


4
,  ,

3 Binary is a base 2 number system.

(a) Give the name of the number system that is base 16.

............................................................................................................................................. [1]

(b) Three denary numbers are entered into a computer. The computer converts the numbers and
stores them as binary.

(i) Give the binary number that would be stored for each of the denary numbers.

DO NOT WRITE IN THIS MARGIN


10 ......................................................................................................................................

50 ......................................................................................................................................

201 ....................................................................................................................................
[3]

Working space

...........................................................................................................................................

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(ii) Explain why the data is converted to binary by the computer.

...........................................................................................................................................

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................

..................................................................................................................................... [2]

(c) The two binary integers 00110000 and 01100110 are added together.

Add the binary integers using binary addition and show your answer in binary. Show all your
working.

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

ĬÕú¾Ġ³íÇûÍġ½ĞêĈØĐ×
© UCLES 2024 ĬĖĜäÈĬ³ĩà÷ĆÒĎâÙĉßĂ
ĥĥĕĕõÕąĕąąåÕĥÅåĕÕÕ
0478/12/M/J/24
* 0019654976305 *
DO NOT WRITE IN THIS MARGIN

5
,  ,

(d) The denary integer –32 is stored as a two’s complement integer.

Calculate the two’s complement integer that would be stored.

Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

............................................................................................................................................. [2]

4 A student uses both system software and application software on their computer.

(a) Give one example of system software.

............................................................................................................................................. [1]
DO NOT WRITE IN THIS MARGIN

(b) Give two examples of application software.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(c) Describe the difference between system software and application software.

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]
DO NOT WRITE IN THIS MARGIN

Ĭ×ú¾Ġ³íÇûÍġ½ĞêĆØĐ×
© UCLES 2024 ĬĖěãÀЯęÙāûėÊÚýĉÏĂ
ĥĥĥÕµµĥõĕõõÕĥåÅÕÅÕ
0478/12/M/J/24 [Turn over
* 0019654976306 *

DO NOT WRITE IN THIS MARGIN


6
,  ,

5 Instructions are processed by a central processing unit (CPU) in a computer.

(a) Complete the paragraph about fetching an instruction into the CPU to be processed.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

address arithmetic logic unit (ALU) binary control unit (CU)

DO NOT WRITE IN THIS MARGIN


current instruction register (CIR) data denary driver

fetch interrupt memory address register (MAR)

memory data register (MDR) random access memory (RAM)

read only memory (ROM) secondary storage signal

The program counter contains the ………………………………………………………

DO NOT WRITE IN THIS MARGIN


of the next instruction to be processed; this is then sent to the

……………………………………………………… using the address bus. The address is then

sent to the ……………………………………………………… .

Once the address is received, the instruction stored at the location is

sent to the ………………………………………………………, using the

……………………………………………………… bus. The instruction is then

sent to the ……………………………………………………… that is built into the

DO NOT WRITE IN THIS MARGIN


……………………………………………………… .
[7]

(b) The CPU uses an instruction set to decode the instruction.

State what is meant by an instruction set.

...................................................................................................................................................

............................................................................................................................................. [1]
DO NOT WRITE IN THIS MARGIN

ĬÙú¾Ġ³íÇûÍġ½ĞëĆÕĎ×
© UCLES 2024 ĬĖĜãÃĨ×ēÑĆĊĞêâĠáßĂ
ĥµÅÕµĕĥÕÕĕÕÕååĥĕĕÕ
0478/12/M/J/24
* 0019654976407 *
DO NOT WRITE IN THIS MARGIN

7
,  ,

6 The table contains statements about error detection methods.

Complete the table by giving the correct error detection method for each statement.

error detection method statement

…………………………………………… An odd or even process can be used.

A value is calculated from the data, using an


…………………………………………… algorithm. This happens before and after the data
DO NOT WRITE IN THIS MARGIN

is transmitted.

A copy of the data is sent back to the sender by


……………………………………………
the receiver.

…………………………………………… Acknowledgement and timeout are used.

A value is appended to data that has been


…………………………………………… calculated using the data. This value is checked
on data entry.
[5]
DO NOT WRITE IN THIS MARGIN

7 A computer has both a media access control (MAC) address and an internet protocol (IP) address.

(a) Tick (3) one box to show which of the statements is correct about the MAC address.

A It is assigned by the manufacturer.

B It is assigned by a router.

C It can be static or dynamic.


DO NOT WRITE IN THIS MARGIN

D It is made up of three different parts.


[1]

(b) An IP address can have an IPv4 or IPv6 format.

(i) Give an example of an IP address that has an IPv4 format.

..................................................................................................................................... [1]

(ii) Give two characteristics of the IPv6 format.

1 ........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]
ĬÛù¿Ġ³íÇûÍġ½ĞìĆÕĎ×
© UCLES 2024 ĬĖĜáÀīèõâćöÙđĢĠđ×Ă
ĥąĥĕµµÅµµĕõÕĥĥĥÕåÕ
0478/12/M/J/24 [Turn over
* 0019654976408 *

DO NOT WRITE IN THIS MARGIN


8
,   ,

8 A company has a website that is suffering a distributed denial of service (DDoS) attack.

(a) Draw and annotate a diagram to show the process of the DDoS.

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN
[5]

(b) Identify a solution that can be used to help prevent the DDoS attack being successful.

............................................................................................................................................. [1]

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN

ĬÙù¿Ġ³íÇûÍġ½ĞêĈÕĐ×
© UCLES 2024 ĬĖĜäÀġÖôÕĉíÒ³¾¾āßĂ
ĥµµĕõµÅĕÕµąÕåĥÅÕµÕ
0478/12/M/J/24
* 0019654976409 *
DO NOT WRITE IN THIS MARGIN

9
,   ,

9 A company uses both solid-state and optical secondary storage.

(a) Explain why a computer needs secondary storage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]
DO NOT WRITE IN THIS MARGIN

(b) Describe three differences between solid-state and optical storage.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................
[6]
DO NOT WRITE IN THIS MARGIN

ĬÛù¿Ġ³íÇûÍġ½ĞêĆÕĐ×
© UCLES 2024 ĬĖěãÈħÚĄäïĄėħ¶ĚāÏĂ
ĥµÅÕµÕåõÅÅÕÕåąåĕåÕ
0478/12/M/J/24 [Turn over
* 0019654976410 *

DO NOT WRITE IN THIS MARGIN


10
,  ,

10 A garage uses an expert system to help diagnose any problems with cars that need repair.

(a) The expert system is an example of artificial intelligence (AI).

Describe what is meant by AI.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


............................................................................................................................................. [2]

(b) A car has a problem with its braking system, so it is brought into the garage.

Explain how the expert system operates and how it is used to help diagnose the problem.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


............................................................................................................................................. [5]

DO NOT WRITE IN THIS MARGIN

ĬÙù¿Ġ³íÇûÍġ½ĞëĈ×Ď×
© UCLES 2024 ĬĖęäÅģÎĦÛĂöüÏÀê¹×Ă
ĥĥÕÕõµĥĕõąąĕåÅÅÕąÕ
0478/12/M/J/24
* 0019654976411 *
DO NOT WRITE IN THIS MARGIN

11
,  ,

11 A company has a website. Users use the internet and the world wide web to access the website.

(a) Describe the difference between the internet and the world wide web.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]
DO NOT WRITE IN THIS MARGIN

(b) The website has a uniform resource locator (URL). The URL has three different parts.

Identify the three different parts that are included in the URL.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]
DO NOT WRITE IN THIS MARGIN

(c) One function of a web browser is to provide an address bar for a user to enter a URL.

Give three other functions of a web browser.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

ĬÛù¿Ġ³íÇûÍġ½ĞëĆ×Ď×
© UCLES 2024 ĬĖĚã½ĥÒĖÞøċ­ċ¸î¹çĂ
ĥĥåĕµÕąõĥõÕĕåååĕĕÕ
0478/12/M/J/24
* 0019654976412 *

DO NOT WRITE IN THIS MARGIN


12
,  ,

BLANK PAGE

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
ĬÙù¿Ġ³íÇûÍġ½ĞéĈ×Đ×
© UCLES 2024 ĬĖĚâ½ğäēÙúĄ¶éĜÐéÏĂ
ĥÕõĕõÕąÕąÕåĕĥåąĕąÕ
0478/12/M/J/24
Cambridge IGCSE™
* 2 0 8 1 7 4 3 8 5 1 *

COMPUTER SCIENCE 0478/13


Paper 1 Computer Systems May/June 2024

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (CE) 329144/3
© UCLES 2024 [Turn over
2

1 The size of a file can be measured in different units.

(a) State how many bits there are in a byte.

............................................................................................................................................. [1]

(b) State how many kibibytes (KiB) there are in 2 mebibytes (MiB).

............................................................................................................................................. [1]

(c) Identify the unit of data that is equal to 4 bits.

............................................................................................................................................. [1]

2 An image has a 16-bit colour depth and a resolution of 1000 × 1750 pixels.

(a) State what is meant by a 16-bit colour depth.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) The resolution of the image is changed to 750 × 1500 pixels.

Give the effect this will have on the file size of the image.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2024 0478/13/M/J/24


3

3 A programmer is creating a computer game. One character is not moving correctly.

The programmer needs to debug the program. To do this they need to look at addresses that are
locations in memory.

The addresses are displayed as hexadecimal numbers.

(a) One address is A2F.

(i) Convert the address to binary.

..................................................................................................................................... [3]

(ii) Convert the address to denary.

..................................................................................................................................... [1]

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(b) The binary number stored for another address is 000110011011.

(i) Convert the binary number to hexadecimal.

..................................................................................................................................... [3]

(ii) Convert the binary number to denary.

..................................................................................................................................... [1]

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(c) Give one reason why the addresses are displayed in hexadecimal instead of binary.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2024 0478/13/M/J/24 [Turn over


4

(d) Identify two other ways that hexadecimal is used in computer science.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(e) The health value for a character in the computer game can sometimes be a negative value.
The negative values are stored as two’s complement 8-bit integers.

A character has a health value of –25.

Calculate the two’s complement 8-bit integer for –25. Show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

4 The table contains statements about types of secondary storage.

Complete the table by writing the correct type of secondary storage for each statement.

type of secondary storage statement

................................................. Pits and lands are created on a reflective surface.

................................................. NAND or NOR technology is used.

................................................. Platters are spun that are divided into tracks and sectors.

................................................. Electromagnets are used to read and write data.

................................................. Transistors are used as control gates and floating gates.

................................................. A red or blue laser is used to read and write data.

[6]

© UCLES 2024 0478/13/M/J/24


5

5 A computer uses both random access memory (RAM) and read only memory (ROM).

(a) Tick (3) one box to show which statement is correct about RAM.

A It is non-volatile storage.

B It stores the bootloader.

C It stores data that is currently in use.

D It is not directly accessible by the central processing unit (CPU).


[1]

(b) ROM is a type of primary storage.

State the characteristic of ROM that makes it a type of primary storage.

...................................................................................................................................................

............................................................................................................................................. [1]

6 A sensor is an input device that is used to capture data from its surrounding environment.

(a) Circle three other input devices.

touch screen hard disk drive (HDD) headphones

speaker microphone actuator

universal serial bus (USB) drive printer keyboard


[3]

(b) Sensors can be used in an automated system.

Give two benefits of using sensors in this type of system.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2024 0478/13/M/J/24 [Turn over


6

(c) The table contains different types of sensors and a use for each.

Complete the table by giving a suitable use for each type of sensor. The first one has been
done for you.

type of sensor use

to monitor whether a water pipe has cracked and is leaking and dripping
acoustic
onto the floor

................................................................................................................
temperature
................................................................................................................

................................................................................................................

................................................................................................................
humidity
................................................................................................................

................................................................................................................

................................................................................................................
infra-red
................................................................................................................

................................................................................................................

................................................................................................................
magnetic field
................................................................................................................

................................................................................................................
[4]

© UCLES 2024 0478/13/M/J/24


7

7 A company has a network that includes a web server.

Data is transmitted across the network using serial half-duplex data transmission.

(a) Draw and annotate a diagram to show how the data is transmitted using serial half-duplex
data transmission.

[4]

(b) Give two benefits of the company using serial half-duplex data transmission for this purpose.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(c) Give one drawback of the company using serial half-duplex data transmission for this
purpose.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2024 0478/13/M/J/24 [Turn over


8

(d) The company uses a proxy server to help protect the web server and the network from cyber
security threats.

(i) Give three cyber security threats that the proxy server can help protect against.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

(ii) Identify two functions of the proxy server that can be used to help protect the web server
and the network.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(e) Customers access the company’s web pages that are stored on the web server.

Describe how the web pages are located, retrieved and displayed on a customer’s computer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2024 0478/13/M/J/24


9

8 A student has a computer that has a central processing unit (CPU).

(a) Describe the role of the CPU in the computer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) The CPU contains registers.

(i) State the purpose of a register.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Give three registers that are built into the CPU.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

(c) One component in the CPU is the arithmetic logic unit (ALU).

Describe the purpose of the ALU.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2024 0478/13/M/J/24 [Turn over


10

(d) The student wants to replace the CPU to increase the performance of the computer.

Explain why a different CPU can increase the performance.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2024 0478/13/M/J/24


11

9 A printer runs out of ink and needs a new ink cartridge. An interrupt is sent and a message is
generated to notify the user that the ink cartridge is empty.

(a) Complete the paragraph about the use of an interrupt in this process.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

binary clock computer data error

fetch–decode–execute cycle hexadecimal higher interrupt queue

interrupt service routine (ISR) lower printer priority level

secondary storage sorting transmission

The ...................................................................... sends an interrupt to the

...................................................................... . The interrupt is given a

...................................................................... . The processor completes its current

...................................................................... and checks the

...................................................................... to see if there is an interrupt with

...................................................................... priority than the current task. If there is, it stores

the current task and fetches the interrupt. It then calls the

...................................................................... , which is a sequence of instructions that

handles the interrupt. The interrupt is handled, which generates a message to the user to

notify them that the ink cartridge is empty.


[7]

(b) Handling interrupts is one function of an operating system.

Give two functions of an operating system that relate to memory.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

© UCLES 2024 0478/13/M/J/24


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2024 0478/13/M/J/24


Cambridge IGCSE™
* 1 8 6 2 2 6 2 8 5 3 *

COMPUTER SCIENCE 0478/12


Paper 1 Computer Systems February/March 2023

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (EF) 313505/3
© UCLES 2023 [Turn over
2

1 Computers can be infected with malware. Spyware is one example of malware.

(a) Tick (✓) one box to show a correct definition of spyware.

A Software that activates a webcam and transmits the video to a third party
that outputs it live on a website.

B Software that detects when a password is being entered and then emails
the password to a third party.

C Software that records all data entered into a computer, analyses this data
to find email addresses and passwords, then posts these to a website.

D Software that records all key presses and transmits these to a third party.

[1]

(b) Complete the table by identifying and describing two other examples of malware.

Malware Description

...........................................................................................................

...........................................................................................................
......................................
1 ...........................................................................................................
......................................
...........................................................................................................

...........................................................................................................

...........................................................................................................

...........................................................................................................
......................................
2 ...........................................................................................................
......................................
...........................................................................................................

...........................................................................................................

[6]

© UCLES 2023 0478/12/F/M/23


3

(c) Proxy‑servers and firewalls have some similar functions.

Identify two similarities and one difference between proxy‑servers and firewalls.

Similarity 1 ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Similarity 2 ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Difference .................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2023 0478/12/F/M/23 [Turn over


4

2 A programmer has designed a three‑dimensional (3D) interactive computer game. They are going
to develop a program for the game. The program needs to run efficiently, but it must also be
developed as soon as possible.

(a) Tick (✓) one box to identify whether the programmer should use a high‑level language or a
low‑level language to develop the program.

Explain the reasons for your choice.

High‑level language

Low‑level language

Reasons for your choice ...........................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) If the programmer chooses a high‑level language, they can use a compiler or an interpreter to
translate the high‑level language into a low‑level language.

Describe the operation of a compiler and of an interpreter.

Compiler ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Interpreter .................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2023 0478/12/F/M/23


5

3 A new computer comes with primary and secondary storage.

(a) Data storage is measured using binary denominations.

Complete each conversion.

8 bytes = .............................. nibbles

512 kibibytes (KiB) = .............................. mebibytes (MiB)

4 gibibytes (GiB) = .............................. mebibytes (MiB)

1 exbibyte (EiB) = .............................. pebibytes (PiB)


[4]
Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Random access memory (RAM) is an example of primary storage.

Give three examples of data that is commonly stored in RAM.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(c) Describe the purpose of secondary storage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/12/F/M/23 [Turn over


6

4 A wildlife photographer stores their digital images on a computer.

(a) Complete the table by defining each term about images.

Image term Definition

...................................................................................................................

pixel ...................................................................................................................

...................................................................................................................

...................................................................................................................

resolution ...................................................................................................................

...................................................................................................................

[2]

(b) One of the images has a resolution of 1000 × 1000 and a colour depth of 2 bytes.

Calculate the file size of the image. Give your answer in bytes.

Show your working.

Working space ..........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

File size ...................................... bytes


[2]

© UCLES 2023 0478/12/F/M/23


7

(c) The photographer decides to purchase a solid‑state storage device to back up their images.

Complete the description of solid‑state storage.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

binary denary electrons grid neutrons

non‑volatile RAM star transistors virtual volatile

Solid‑state storage is ........................................................... . This means that the data is not

lost when the power is turned off.

Solid‑state storage is made of ........................................................... that are laid out in a

........................................................... .

Gates are used to control the flow of the ........................................................... through the

transistors. This changes the data in the transistors from 1 to 0, or from 0 to 1.


[4]

(d) The photographer compresses an image file before it is emailed.

Give one reason why a file is compressed.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2023 0478/12/F/M/23 [Turn over


8

5 A website allows users to purchase items.

Computer A sends a request for the homepage to the website’s server.

(a) The request is sent using packet switching.

The structure of a packet of data has three elements. One element is the packet header.

(i) Identify two items of data contained in a packet header.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(ii) Identify the two other elements of a packet.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

© UCLES 2023 0478/12/F/M/23


9

(b) Computer A needs to be directly connected to a router that is located in a different room.

(i) Tick (✓) one box to identify whether serial data transmission or parallel data transmission
is more suitable for this connection.

Explain the reasons for your choice.

Serial data transmission

Parallel data transmission

Reasons for your choice ...................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) The connection will also use full‑duplex data transmission.

Define full‑duplex data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2023 0478/12/F/M/23 [Turn over


10

(c) The data transmission will use parity checks.

(i) The bytes need to be sent using an even parity byte check.

Complete the parity bit for each byte.

Parity
bit

Byte A 1 1 0 0 0 1 1

Byte B 0 0 0 0 0 0 0

[2]

(ii) A parity block check can be used instead of a parity byte check.

Explain how a parity block check might detect an error in transmission that would not be
detected by a parity byte check.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2023 0478/12/F/M/23


11

(iii) The data was sent using an even parity block check. One of the bits has been transmitted
incorrectly.

Parity
Bit 1 Bit 2 Bit 3 Bit 4 Bit 5 Bit 6 Bit 7
bit

Byte 0 1 1 1 0 1 0 0 0

Byte 1 0 0 1 0 0 1 0 0

Byte 2 1 0 1 1 0 0 0 1

Byte 3 1 1 0 0 1 1 1 1

Byte 4 1 0 1 0 0 0 1 0

Byte 5 0 0 0 0 0 0 0 0

Byte 6 0 1 1 1 1 0 0 0

Parity
0 1 1 0 1 0 1 0
byte

Identify the bit number and the byte number of the incorrect bit.

Bit number ......................................

Byte number ......................................


[2]

© UCLES 2023 0478/12/F/M/23 [Turn over


12

(d) The website allows the user to set up an account to log on and purchase items. The website
is accessed and displayed using a web browser.

(i) Two functions of the web browser are to render hypertext markup language (HTML) to
display web pages and to store cookies.

Identify two other functions of a web browser.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(ii) Identify two ways that cookies can be used to enhance the user’s experience of this
website.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2023 0478/12/F/M/23


13

6 A company is involved in robotics.

One of its robots is designed to make a specific movement depending on a binary value.

(a) The table gives some of the movements for the robot.

Complete the table by writing the missing binary, denary or hexadecimal value for each
movement.

Movement Binary Denary Hexadecimal

forward 1 step 00011111 31

back 1 step 140 8C

turn right 01011010 5A

turn left 120 78

[4]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Describe what is meant by robotics.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/12/F/M/23 [Turn over


14

(c) The robot has a sensor and a microprocessor.

The robot will move forward continuously until it detects an object that is less than or equal to
10 cm in front of it.

If an object is less than or equal to 10 cm in front of it, the robot turns 90 degrees right. It then
tries to move forward again.

Explain how the sensor and the microprocessor are used to automate this robot.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [7]

© UCLES 2023 0478/12/F/M/23


15

(d) The robot needs to find its way through different puzzles. Each puzzle has a series of paths
that the robot needs to follow to find its way to the end of the puzzle. The puzzle contains
dead ends and obstacles, so the robot needs to decide which way to go.

The robot’s program will use artificial intelligence (AI).

(i) Describe the characteristics of AI.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) Explain how the program will use AI.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2023 0478/12/F/M/23


16

BLANK PAGE

Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2023 0478/12/F/M/23


Cambridge IGCSE™
* 5 0 1 5 4 0 7 3 5 7 *

COMPUTER SCIENCE 0478/12


Paper 1 Computer Systems February/March 2024

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (DE) 327909/3
© UCLES 2024 [Turn over
2

1 Computers represent different types of data in binary.

(a) Tick (✓) one box to show the reason why computers use binary to represent data.

A Computers only allow 1s and 0s to be entered.

B Computers are made of switches and gates that can only be on or off.

C Binary does not need to be converted into other forms of data to be displayed.

D Both computers and humans can quickly process binary data.


[1]

(b) One form of data is characters.

The American standard code for information interchange (ASCII) denary number for the
character ‘N’ is 78.

(i) Tick (✓) one box to identify the ASCII denary number for the character ‘Q’.

A 81

B 80

C 79

D 77
[1]

(ii) Give the binary number for the ASCII denary number for ‘N’.

..................................................................................................................................... [1]

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(iii) Explain how the word ‘RED’ is represented using a character set.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]
© UCLES 2024 0478/12/F/M/24
3

(c) Sound can be represented as binary.

(i) Explain why recording sound with a higher sampling resolution creates a more accurate
recording.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Give one other way that the accuracy of a sound recording can be improved.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2024 0478/12/F/M/24 [Turn over


4

2 A computer has a central processing unit (CPU).

The CPU includes the registers:


• Program counter (PC)
• Memory address register (MAR)
• Memory data register (MDR)
• Accumulator (ACC)
• Current instruction register (CIR).

(a) The table contains five statements about the role of registers in the fetch–decode–execute
cycle of a CPU.

Letter Statement
A PC stores the address of the next instruction to be accessed
B MAR stores the instructions of the program that is running
C MDR stores the data passed to it from the PC
D ACC stores the result of each calculation
E CIR stores the instruction currently being executed

Two of the statements are not correct.

Identify the letter of each incorrect statement.

Suggest a corrected statement for each.

Incorrect statement 1 .........................................

Corrected statement .................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Incorrect statement 2 .........................................

Corrected statement .................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(b) The computer has a single core 3.5 GHz processor and an 8 kB cache.

(i) State what is meant by a 3.5 GHz processor.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2024 0478/12/F/M/24


5

(ii) The CPU is changed to a dual-core 3.5 GHz processor.

Explain how the number of cores affects the performance of a CPU.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) The amount of cache is increased to 64 kB.

Explain how the amount of cache affects the performance of a computer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(c) The computer has both primary and secondary storage.

(i) Random access memory (RAM) is one example of primary storage.

Describe what is meant by RAM.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Read only memory (ROM) is another example of primary storage. ROM often stores the
start-up instructions for a computer.

Identify one other item of data that is commonly stored in ROM.

...........................................................................................................................................

..................................................................................................................................... [1]

(iii) Some computers make use of virtual memory.

State the purpose of virtual memory.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2024 0478/12/F/M/24 [Turn over


6

3 A computer has an operating system (OS).

(a) Complete the table by writing each missing OS function name and description.

Function name Description

……………………………………………………………………………

……………………………………………………………………………
managing memory
……………………………………………………………………………

……………………………………………………………………………

……………………................…
allows application software to run on the computer
……………………................…

……………………………………………………………………………

……………………………………………………………………………
managing peripherals
……………………………………………………………………………

……………………………………………………………………………

[3]

(b) The OS handles interrupts.

(i) State the purpose of an interrupt.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Identify one input device and one example of an interrupt that it can generate.

Input device .......................................................................................................................

Interrupt .............................................................................................................................
[1]

© UCLES 2024 0478/12/F/M/24


7

(iii) A processor is currently executing a program. The processor receives an interrupt.

Explain how the processor manages the current program and the interrupt.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

© UCLES 2024 0478/12/F/M/24 [Turn over


8

4 A student enters a uniform resource locator (URL) into their web browser.

Draw and annotate a diagram to show the process from the user entering the URL to the web
browser displaying the web page.

[5]

© UCLES 2024 0478/12/F/M/24


9

5 Complete the description of digital currencies using the terms provided.

blockchains changed datachains decentralised

deleted encryption passport physical address

physically records time-stamp traced

transaction-chains virtually

A digital currency does not exist ........................................................... , it can only be accessed

electronically.

Some digital currencies have digital ledgers called ........................................................... .

These are decentralised databases where each transaction is stored as a new set of data with

a ........................................................... and is linked to the previous set of data. This means that

transactions cannot be altered, only new transactions added, which allows the location of the data

to be ........................................................... .
[4]

© UCLES 2024 0478/12/F/M/24 [Turn over


10

6 A self-driving tractor sows seeds and harvests crops for a farmer. The self-driving tractor moves
automatically through the field, turning at each end and stopping when it has finished.

(a) One reason the self-driving tractor is a robot is because it has a mechanical structure that
includes wheels, an engine, and a framework.

Give one other reason why the self-driving tractor is an example of a robot.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) If a person is detected within 3 metres whilst the tractor is moving, the self-driving tractor
must stop.

(i) Explain how an infra-red sensor, microprocessor and actuator can be used to stop the
self-driving tractor if a person is detected within 3 metres.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

(ii) Identify one other sensor that the self-driving tractor might use and how it will use the
sensor.

Sensor ...............................................................................................................................

Use ....................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2024 0478/12/F/M/24


11

(c) Explain the drawbacks of a farmer using a self-driving tractor to sow seeds and harvest crops.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(d) The self-driving tractor has an in-built expert system that the farmer can use to solve any
errors with the tractor.

Identify three components of an expert system.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(e) At the end of each day the self-driving tractor transmits the data it has collected to the farmer’s
computer in their house.

The transmission uses an echo check.

(i) Describe the role of the self-driving tractor and the farmer’s computer in the echo check.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

© UCLES 2024 0478/12/F/M/24 [Turn over


12

(ii) Another method of error checking is a parity block check.

The table shows 7 bytes that are transmitted using odd parity. The parity bit has been
completed for each byte.

Complete the parity byte for the data.

parity
bit 7 bit 6 bit 5 bit 4 bit 3 bit 2 bit 1
bit

byte 1 1 1 0 0 1 1 1 0

byte 2 1 0 0 0 0 1 1 0

byte 3 0 1 0 0 0 0 0 0

byte 4 0 1 0 0 1 1 1 1

byte 5 1 0 0 0 0 0 0 0

byte 6 0 1 1 1 1 1 1 1

byte 7 1 1 0 0 1 1 0 1

parity
byte
[3]

© UCLES 2024 0478/12/F/M/24


13

7 Data is transmitted using the internet.

(a) The data is encrypted before transmission.

(i) State the purpose of encrypting data.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Describe the differences between symmetric and asymmetric encryption.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(b) The data is transmitted using packet switching.

(i) Identify two items of data contained in a packet header.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(ii) Give the purpose of a router in the packet-switching process.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2024 0478/12/F/M/24 [Turn over


14

8 (a) Hexadecimal can be used to represent binary numbers.

(i) Convert the denary number 236 into hexadecimal.

...........................................................................................................................................

..................................................................................................................................... [1]

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(ii) Give one benefit of using hexadecimal instead of binary to represent data.

...........................................................................................................................................

..................................................................................................................................... [1]

(b) Two’s complement can be used to represent positive and negative binary integers.

(i) Convert the two’s complement integer 10110111 into denary.

Show all your working.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Convert the denary number 45 into an 8-bit two’s complement integer.

...........................................................................................................................................

..................................................................................................................................... [1]

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

© UCLES 2024 0478/12/F/M/24


15

(c) Logical shifts are performed on binary integers.

State the mathematical effect of a right shift of four places on a positive binary integer.

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2024 0478/12/F/M/24


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2024 0478/12/F/M/24


Cambridge IGCSE™
* 8 4 5 6 7 7 9 7 4 9 *

COMPUTER SCIENCE 0478/11


Paper 1 Computer Systems May/June 2023

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (EF) 313965/2
© UCLES 2023 [Turn over
2

1 Binary is a number system used by computers.

(a) Tick (3) one box to show which statement about the binary number system is correct.

A It is a base 1 system

B It is a base 2 system

C It is a base 10 system

D It is a base 16 system
[1]

(b) Denary numbers are converted to binary numbers to be processed by a computer.

Convert these three denary numbers to 8‑bit binary numbers.

50 ..............................................................................................................................................

102 ............................................................................................................................................

221 ............................................................................................................................................
[3]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2023 0478/11/M/J/23


3

(c) Binary numbers are stored in registers.

Negative denary numbers can be represented as binary using two’s complement.

Complete the binary register for the denary number –78

You must show all your working.

Working space ..........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Register:

[2]

(d) Two 8‑bit binary numbers are given.

Add the two 8‑bit binary numbers using binary addition.

Give your answer in binary. Show all your working.

00110011
+01100001

[3]

(e) Two binary numbers are added by a computer and an overflow error occurs.

Explain why the overflow error occurred.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/11/M/J/23 [Turn over


4

2 A student has a sound file that is too large to be stored on their external secondary storage device.
The student compresses the sound file to make the file size smaller.

The compression method used reduces the sample rate and the sample resolution of the sound
file.

(a) State what is meant by the sample rate and sample resolution.

Sample rate ..............................................................................................................................

...................................................................................................................................................

Sample resolution .....................................................................................................................

...................................................................................................................................................
[2]

(b) Identify which type of compression has been used to compress the sound file.

...................................................................................................................................................

............................................................................................................................................. [1]

(c) The student sends the sound file to a friend. The file is transmitted across a network that uses
packet switching.

(i) Identify two pieces of data that would be included in the header of each packet.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(ii) Explain how the file is transmitted using packet switching.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

© UCLES 2023 0478/11/M/J/23


5

3 Secondary storage devices are used to store data in a computer.

(a) Circle three components that are secondary storage devices.

central processing unit (CPU) compact disk (CD)

hard disk drive (HDD) random access memory (RAM) read only memory (ROM)

register sensor solid‑state drive (SSD)

[3]

(b) Tick (3) one box to show which statement about secondary storage is correct.

A It is directly accessed by the CPU.

B It is magnetic storage only.

C It is used to permanently store software and data files.

D It is volatile.
[1]

4 Complete the statements about different types of software.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

application assembly language bootloader central processing unit (CPU)

firmware hardware operating output system user

........................................................................ software provides the services that the computer

requires; an example is utility software.

........................................................................ software is run on the operating system.

The ........................................................................ system is run on the firmware, which is run on

the ........................................................................ .
[4]

© UCLES 2023 0478/11/M/J/23 [Turn over


6

5 A farm has an automated drinking system for its animals. The drinking system has a water bowl
that contains the water. When the water bowl is empty, it is automatically refilled.

The system uses a sensor and a microprocessor.

(a) Identify the most appropriate sensor for this system.

............................................................................................................................................. [1]

(b) Describe how the sensor and the microprocessor are used to automatically refill the water
bowl.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2023 0478/11/M/J/23


7

6 A user wants to connect their computer to a network.

(a) (i) Identify the component in the computer that is needed to access a network.

..................................................................................................................................... [1]

(ii) Identify the type of address that is allocated to the component by the manufacturer,
which is used to uniquely identify the device.

..................................................................................................................................... [1]

(b) A dynamic internet protocol (IP) address is allocated to the computer when it is connected to
the network.

(i) Identify the device on the network that can connect multiple devices and automatically
assign them an IP address.

..................................................................................................................................... [1]

(ii) Describe what is meant by a dynamic IP address.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

7 A programmer uses a low‑level language to write a computer program for a vending machine.

(a) Describe what is meant by a low‑level language.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Give two reasons why the programmer would choose to write the computer program in a
low‑level language instead of a high‑level language.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]
© UCLES 2023 0478/11/M/J/23 [Turn over
8

8 A manager at a company is concerned about a brute‑force attack on its employee user accounts.

(a) Describe how a brute‑force attack can be used to gain access to the employee user accounts.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) One possible aim for carrying out a brute‑force attack is to install malware onto the company
network.

(i) State two other aims for carrying out a brute‑force attack to gain access to the employee
user accounts.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(ii) Identify three types of malware that could be installed.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

(c) Give two security solutions that could be used to help prevent a brute‑force attack being
successful.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2023 0478/11/M/J/23


9

9 A company uses robots in its factory to manufacture large pieces of furniture.

(a) One characteristic of a robot is that it is programmable.

State two other characteristics of a robot.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Give two advantages to company employees of using robots to manufacture large pieces of
furniture.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(c) Give one disadvantage to the company’s owners of using robots to manufacture large pieces
of furniture.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2023 0478/11/M/J/23 [Turn over


10

10 A student uses the internet for their schoolwork to research what is meant by pharming.

(a) State the aim of pharming.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Draw and annotate a diagram to represent the process of pharming.

[4]

(c) The student uses a web browser to access data on the internet.

Explain the purpose of the web browser.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2023 0478/11/M/J/23


11

(d) Storing cookies is one function of the web browser.

Give three other functions of the web browser.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

(e) A student visits a website that uses session cookies, instead of persistent cookies.

Explain the difference between session cookies and persistent cookies.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2023 0478/11/M/J/23


12

BLANK PAGE

Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2023 0478/11/M/J/23

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy