Compression Choices for File Transfer
Compression Choices for File Transfer
* 6 7 8 3 3 1 8 6 1 7 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (KS) 205016
© UCLES 2020 [Turn over
2
1 Tina is creating a website for charity events. She uses HTML to create the website.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) She uses the hexadecimal colour code #43B7F0 as the background colour for her website.
..................................................................................................................................... [1]
(ii) The hexadecimal colour code #43B7F0 is stored in three 8-bit registers.
Give the 8-bit binary values for each part of the hexadecimal code.
43
B7
F0
[6]
(c) Tina uses a microphone to record a welcome message for her website.
..................................................................................................................................... [1]
(ii) She wants to compress the recording to make sure that the file is as small as possible
for the website.
Identify which type of compression she should use and describe how this would compress
the file for the website.
Description
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(iii) Give two benefits of compressing the file for the website.
Benefit 1 ............................................................................................................................
...........................................................................................................................................
Benefit 2 ............................................................................................................................
...........................................................................................................................................
[2]
(d) Tina will use the TLS protocol in her website when selling tickets to people for different charity
events. This makes sure that their personal data is transmitted securely.
(i) Identify the two layers that are present in the TLS protocol.
Layer 1 ..............................................................................................................................
Layer 2 ..............................................................................................................................
[2]
(ii) Explain how data is sent securely using the TLS protocol.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [6]
(i) Identify three security threats to her web server that Tina might be concerned about.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(ii) Tina installs a proxy server to help protect her website from security threats.
Describe how the proxy server will help protect the website.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
2 Four 7-bit binary values are transmitted from one computer to another. A parity bit was added
to each binary value creating 8-bit binary values. All the binary values have been transmitted
correctly.
(a) Tick (✓) to show whether an Even or an Odd parity check has been used for each binary
value.
Even Odd
8-bit binary value
(✓) (✓)
11111111
01100110
01111011
10000000
[4]
Describe how a checksum can be used to check that the data has been transmitted correctly.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
(a) (i) Identify three ways that the data could be accidentally damaged.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(ii) State what Alessandro could do to make sure that he can retrieve his data if it is
accidentally damaged.
..................................................................................................................................... [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Blu-ray CD DVD
Statement
(✓) (✓) (✓)
All logic gates must have a maximum of two inputs. Do not attempt to simplify the logic
statement.
B X
[4]
(b) Complete the truth table for the given logic statement.
A B C Working space X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
True False
Statement
(✓) (✓)
It is a front-lit display
[5]
(b) Tammy connects the computer to her home network. The computer has a MAC address and
an IP address.
Complete the paragraph using the list of terms given. Not all terms need to be used.
• compiled
• computer
• control
• dynamic
• identify
• packet
• principal
• protocol
• similar
• unique
…………………………………………… .
[5]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at [Link] after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2020 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
1(b)(i) − Presentation 1
43 0 1 0 0 0 0 1 1
B7 1 0 1 1 0 1 1 1
F0 1 1 1 1 0 0 0 0
1(c)(i) − Input 1
NOTE: If lossless given, marks can be awarded for a correct description of lossless as follow through.
Even Odd
8-bit binary value
() ()
11111111
01100110
01111011
10000000
NOTE: Three different types of human error can be awarded e.g. accidental deletion, not saving data, incorrect shutdown
procedure
Blu-ray CD DVD
Statement
() () ()
4(a) One mark for each correct logic gate with correct input: 4
A B C Working space X
0 0 0 0
0 0 1 1
0 1 0 0
0 1 1 1
1 0 0 0
1 0 1 1
1 1 0 1
1 1 1 1
True False
Statement
() ()
It is a front-lit display
5(b) One mark for each correct term in the correct place: 5
− Control
− Unique
− Identify
− Protocol
− Dynamic
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (PQ) 205670
© UCLES 2020 [Turn over
2
Headphones
2D cutter
LCD projector
Microphone
[5]
2 Paige has a computer that has a central processing unit (CPU) based on the Von Neumann model
for a computer system.
(a) Identify the component within the CPU that controls the flow of data.
............................................................................................................................................. [1]
(b) Identify the component within the CPU where calculations are carried out.
............................................................................................................................................. [1]
(c) Identify the component within the CPU that stores the address of the next instruction to be
processed.
............................................................................................................................................. [1]
(d) Identify the register within the CPU that holds an instruction that has been fetched from
memory.
............................................................................................................................................. [1]
(e) Identify the register within the CPU that holds data that has been fetched from memory.
............................................................................................................................................. [1]
Tick (3) to show if each denary to 8-bit binary conversion is Correct or Incorrect.
Correct Incorrect
Denary Binary Conversion
(3) (3)
145 10010001
179 10110101
11 00010011
100 01100010
[4]
1 1 0 0 0 1 0 0 0 0 0 0
............................................................................................................................................. [3]
4 Eugene has a web server that stores his online shopping website.
(a) Describe how the webpages are requested and displayed on the customer’s computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Threat 1 ....................................................................................................................................
Threat 2 ....................................................................................................................................
Threat 3 ....................................................................................................................................
[3]
(a) Tick (3) to show if the USB connection uses Parallel or Serial data transmission.
Parallel
Serial
Description
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
Benefit 3 ...................................................................................................................................
...................................................................................................................................................
[3]
(c) Arjun uses the Internet to send the digital documents to his friend. He wants to make sure the
documents are sent securely.
Protocol 1 .................................................................................................................................
Protocol 2 .................................................................................................................................
[2]
Complete the paragraph using the list of given terms. Not all terms may need to be used.
• algorithm
• alphanumeric
• cookie
• cypher
• key
• padlock
• plain
• word processed
7 Four 7-bit binary values are transmitted from one computer to another. A parity bit was added
to each binary value creating 8-bit binary values. All the binary values have been transmitted
correctly.
(a) Tick (3) to show whether an Even or an Odd parity check has been used for each binary
value.
Even Odd
8-bit binary value
(3) (3)
10000001
10000010
00101001
00101000
[4]
(b) A parity check may not always detect errors that have occurred in data transmission.
State why a parity check may not detect data transmission errors.
............................................................................................................................................. [1]
(c) Give one other error checking method that could be used to check for errors in data
transmission.
............................................................................................................................................. [1]
8 Edith is buying a new computer monitor that displays images using LCD technology.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
Benefit 3 ...................................................................................................................................
...................................................................................................................................................
[3]
9 Elle uses both CDs and DVDs to store her school projects.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
...................................................................................................................................................
............................................................................................................................................. [1]
All logic gates must have a maximum of two inputs. Do not attempt to simplify the logic
statement.
B X
[4]
(b) Complete the truth table for the given logic statement.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
11 A theme park has a game where a player tries to run from the start to the finish without getting wet.
The system for the game uses sensors and a microprocessor to spray water at a player as they
run past each sensor.
Describe how the sensors and the microprocessor are used in this system.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
12 Warner says that he has a very good Internet Service Provider (ISP) that provides several services.
True False
Statement
(3) (3)
Provides access to the Internet for customers
Stores the content for all web pages available on the Internet
[5]
13 Phishing and pharming are two security issues a user should be aware of when using the Internet.
...................................................................................................................................................
............................................................................................................................................. [1]
Difference 1 ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Difference 2 ..............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at [Link] after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2020 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
1 5
One mark for each correct row:
Headphones
2D cutter
LCD projector
Microphone
145 10010001
179 10110101
11 00010011
100 01100010
3(b) One mark for each correct conversion in the correct order: 3
− C
− 4
− 0
5(a) One mark for correct tick, two marks for description 3
− Serial
If parallel given, no mark for parallel, but follow through for correct description of parallel:
6 − Key // Algorithm 5
− Algorithm // Key (must be opposite of first one)
− Plain
− Cypher
− Key // Algorithm
Even Odd
8-bit binary value
() ()
10000001
10000010
00101001
00101000
10(a) One mark for each correct logic gate with the correct input: 4
Working space
A B C X
0 0 0 0
0 0 1 1
0 1 0 1
0 1 1 0
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 1
11 Six from: 6
− Suitable sensor used e.g. motion sensor/pressure sensor
− (Analogue) data is converted to digital (using ADC)
− Sensor sends data to microprocessor
− Data compared to stored data …
− … if value outside range/within range water is sprayed
− … signal sent to actuator to spray water
− … if value within range/outside range no action taken
− Continuous loop
True False
Statement
() ()
Stores the content for all web pages available on the Internet
13(b) 2
− Phishing involves use of an email whereas pharming involves installing malicious code
− Phishing involves clicking a link or an attachment whereas pharming creates a redirection
COMPUTER SCIENCE
Paper 2210/12
Paper 1
Key messages
Candidates continue to demonstrate a good level of knowledge about the fundamental aspects of computer
science. It would be beneficial for candidates to consider the context that is given in some questions.
Candidates should look to reflect the application of this context in the knowledge and understanding they are
required to demonstrate. This would allow candidates to demonstrate a greater level of understanding,
beyond a general response, about the topic in question.
General comments
Candidates are reminded to make sure that they do not write outside the given writing space in a question. If
additional writing space is required, candidates should use the additional pages available. They should make
sure they clearly indicate the question for which they are providing a further response.
Question 1
(a) Most candidates were able to provide a correct response about the meaning of HTML. The most
common correct response was the expansion of the acronym HTML.
(b) (i) Many candidates correctly identified that background colour is an example of presentation.
(ii) Many candidates were able to correctly convert the hexadecimal values to binary. Some
candidates treated 43 as a denary value, rather than a binary value. This meant their conversion
was incorrect. It would be beneficial for candidates to understand that a hexadecimal value can be
just made up of numeric values, for example 43. This is the hex values of 4 and 3, rather than the
denary value of the number 43.
(c) (i) Many candidates were able to correctly identify a microphone is an input device.
(ii) Many candidates were able to correctly identify that lossy compression would be most suitable. In
the description, many candidates were able to describe that lossy compression removes redundant
data such as sounds that cannot be heard by the human ear. It would be beneficial for candidates
to have a greater understanding of how lossy compression reduces the size of the file. Some
candidates described how it reduced the size of an image file, rather than a sound file. Candidates
are reminded to look at the context of the question and apply this to their answer.
(iii) Many candidates were able to provide two benefits for compressing the file. Some candidates gave
a benefit that it reduces the size of the file. It would be beneficial for candidates to understand that
this is what compression does and is not a benefit of it. It is the impact of this reduction that creates
the benefits.
(d) (i) Many candidates were able to correctly identify the two payers in the TLS protocol.
(ii) Few candidates were able to describe the operation of the TLS protocol. The most common marks
given was for data being encrypted. It would be beneficial for candidates to have a greater
understanding of the TLS protocol.
© 2020
Cambridge Ordinary Level
2210 Computer Science November 2020
Principal Examiner Report for Teachers
(e) (i) Many candidates were able to provide three security threats to the web server. Some candidates
gave responses such as phishing and pharming. Candidates are reminded to apply the context of
the question to their response. It would be beneficial for candidates to understand that phishing and
pharming are not threats to a web server.
(ii) Some candidates understood that a proxy server would look to operate in a similar way to a firewall
to protect the website. Many candidates gave a general description about the operation of a proxy
server, which was not applied to the context. Candidates are reminded to apply the context of the
question to their response.
Question 2
(a) Many candidates were able to correctly identify whether the binary values had been sent using
even or odd parity.
(b) Some candidates were able to provide a full description on the operation of a checksum. It would
be beneficial for candidates to have a greater understanding of how the checksum is generated, to
provide a suitable level of detail in their response.
Question 3
(a) (i) Some candidates were able to provide three correct ways that data could be accidentally damaged.
It would be beneficial for candidates to understand the difference between accidental damage of
data and malicious damage of data. Many candidates incorrectly gave methods of how data is
maliciously damaged, such as hacking and viruses.
(b) Few candidates were able to provide knowledge of both what an SSD is and how it operates to
store data. Most candidates demonstrated knowledge of what an SSD is; few candidates were also
able to demonstrate an understanding of how it operates to store data. It would be beneficial for
candidates to have a greater understanding of how an SSD operates to store data.
(c) Some candidates were able to provide a correct response for all statements. It would be beneficial
for candidates to understand that all three storage examples store data in a spiral track and to
understand that both DVD and Blu-ray can be dual layer.
Question 4
(a) Many candidates were able to draw a correct logic circuit for the logic statements. The most
common error came from candidates that switched the position of the NOR gate and the OR gate.
It would be beneficial for candidates to understand that the Boolean operator in the centre of the
statements will not always be the end logic gate in the logic circuit.
(b) Many candidates were able to correctly complete the truth table.
Question 5
(a) Many candidates were able to provide five correct responses to the statements. The most common
error came from candidates that thought an LED display was a front-lit display.
(b) Most candidates were able to correctly complete the paragraph. The most common errors were
media access computer address and a network device has a similar MAC address.
(c) Most candidates were able to correctly describe the role of a browser.
© 2020
Cambridge Ordinary Level
2210 Computer Science November 2020
Principal Examiner Report for Teachers
COMPUTER SCIENCE
Paper 2210/13
Paper 1
Key messages
Candidates continue to demonstrate a good level of knowledge about the fundamental aspects of computer
science. It would be beneficial for candidates to consider the context that is given in some questions.
Candidates should look to reflect the application of this context in the knowledge and understanding they are
required to demonstrate. This would allow candidates to demonstrate a greater level of understanding,
beyond a general response, about the topic in question.
General comments
Candidates are reminded to make sure that they do not write outside the given writing space in a question. If
additional writing space is required, candidates should use the additional pages available. They should make
sure they clearly indicate the question for which they are providing a further response.
Question 1
Many candidates were able to correctly identify whether each device was an example of an input, output or
storage device. The most common errors came from candidates who identified a 2D cutter as an input
device and a microphone as an output device.
Question 2
(a) Many candidates correctly identified the component as the control unit. Some candidates
incorrectly gave the response of control bus, rather than control unit.
(b) Most candidates correctly identified that component as the arithmetic logic unit.
(c) Many candidates gave the correct response of program counter. Some candidates also gave the
accepted response of the memory address register. This was awarded as the program counter
sends the address of the next instruction to the memory address before it is obtained from memory.
Therefore, it is still the address of the next instruction at this point in the process.
(d) Many candidates gave the accepted response of current instruction register. The instruction will
first come to the memory data register, a response also given by some candidates, and will then be
passed to the current instruction register. In both parts of the process, the instruction is the one that
has been fetched from memory.
(e) Many candidates gave the correct response of the memory data register.
Candidates are reminded that in questions where they are asked to identify, for example, a component, it is
only the first answer they have given that is considered for marking. Any subsequent responses written after
their first answer cannot be considered. Therefore, if they do not want a response at the beginning of the line
to be considered, this must be clearly crossed out, which will allow the examiner to consider the next
response given.
© 2020
Cambridge Ordinary Level
2210 Computer Science November 2020
Principal Examiner Report for Teachers
Question 3
(a) Most candidates were able to correctly convert each denary value to binary and identify whether if
the answer given was correct or incorrect.
(b) Most candidates were able to correctly convert the 12-bit binary number to hexadecimal.
Candidates are reminded that even if a value is converted to 0, they are expected to demonstrate
the value is 0.
Question 4
(a) Some candidates were able to provide a full and detailed explanation of how the webpages are
requested and displayed. The most common parts of the process that could be identified is that the
web browser sends a request to the web server to request the webpages and that the web browser
renders the HTML to display the webpages. It would be beneficial for candidates to understand that
the web browser sends the request to the web server and not the website. The website is a
collection of files, but the web server is the component that receives the request and sends the
website files to the web browser.
(b) Many candidates were able to provide three security threats to the web server. Some candidates
gave responses such as phishing and pharming. Candidates are reminded to apply the context of
the question to their response. It would be beneficial for candidates to understand that phishing and
pharming are not threats to a web server.
Question 5
(a) Many candidates correctly identified the data transmission type as serial and were able to provide a
suitable description of how data is sent using serial transmission. Some candidates gave the
benefits of serial transmission, but the question did not require this.
(b) Many candidates were able to provide three benefits of a USB connection. Some candidates gave
benefits of a USB storage device, rather than a USB connection. It would be beneficial for
candidates to understand the difference between a USB connection and a USB storage device.
(c) Many candidates were able to give two protocols to secure transmit data. The most common
correct answers were HTTPS and SSL.
Question 6
Many candidates were able to correctly complete the paragraph. The most common error given was from
candidates that gave the first missing term as a padlock. It would be beneficial for candidates to understand
that the padlock is not what encrypts the data, it is a symbol that identifies that data sent using the
connection will be encrypted. The encryption is done through the use of a key.
Question 7
(a) Most candidates were able to correctly identify whether even or odd parity had been used.
(b) Many candidates were able to identify that the bits could have been transposed. It would be
beneficial for candidates to be clear and accurate in their answer. For example, some candidates
stated that more than one bit could have changed. This would be true if it was two bits that had
been changed, but not true is it was three bits that had been changed, as this would then add up to
a different parity. Therefore, candidates need to be accurate in stating that it is an even number of
bits that have changed.
(c) Most candidates were able to give one other error checking method. The most common error was
by candidates providing check digit as a response. It would be beneficial for candidates to
understand that check digit is an error checking method used on data entry and not for checking
data after transmission.
© 2020
Cambridge Ordinary Level
2210 Computer Science November 2020
Principal Examiner Report for Teachers
Question 8
(a) Many candidates understood that LCD referred to a liquid crystal display. Few candidates were
able to demonstrate an understanding of the operation of an LCD. Some candidates gave benefits
of the technology rather than explaining how it operates.
(b) Many candidates were able to provide three benefits of LCD technology.
Question 9
(a) Many candidates were able to give three correct similarities. The most common responses seen
were they are optical storage, they are secondary storage and they both are read using a red laser.
(b) Many candidates were able to give one correct difference. The most common response was that
DVD has a higher storage capacity than CD. Some candidates seemed to have a misconception
that data on a DVD is stored in concentric tracks and on a CD is stored in a single spiral track. It
would be beneficial for candidates to understand that both DVD and CD are stored in a spiral track.
DVD RAM, which is different to DVD, stores data in concentric tracks.
Question 10
(a) Most candidates were able to draw a correct logic circuit. Candidates are reminded to make sure
the drawing of their gates are very clear and accurate. Some candidates drew a circle at the right
point of the XOR gate. This turns the gate into an XNOR gate, which is incorrect.
(b) Most candidates were able to correctly complete the truth table.
Question 11
Many candidates were able to describe how the microprocessor and the sensor interacted to make the game
operate. Candidates are reminded to make sure that they apply their answer to the context given in the
question. Some candidates gave a generic response that described how any system operated in using a
sensor and a microprocessor, but without applying it to the context given. Some candidates applied it to a
different context such as an automatic lighting system or a security system.
Question 12
Few candidates were able to correctly identify if the statements were true or false. It would be beneficial for
candidates to have a greater understanding of the role of an Internet Service Provider (ISP).
Question 13
(a) Many candidates were able to correctly identify a similarity between phishing and pharming.
(b) Many candidates were able to correctly identify at least one difference between phishing and
pharming.
© 2020
Cambridge O Level
* 8 4 5 2 7 3 6 3 8 4 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (LO) 213859
© UCLES 2021 [Turn over
2
1 Benedict has a computer that is assigned an Internet Protocol (IP) address. The IP address is:
[Link]
(a) Convert the denary values 167 and 214 from the IP address to 8-bit binary.
167
214
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(b) Benedict’s computer is also assigned a Media Access Control (MAC) address.
...........................................................................................................................................
..................................................................................................................................... [1]
Difference 1 .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Difference 2 .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
She stores three copies of the data using a hard disk drive (HDD), a solid state drive (SSD) and a
USB flash memory drive.
(a) Identify three devices Julia can use to input personal data into her computer.
Device 1 ....................................................................................................................................
Device 2 ....................................................................................................................................
Device 3 ....................................................................................................................................
[3]
(b) Six statements are shown about HDDs, SSDs and USB flash memory drives.
Tick (✓) to show which statements apply to each type of storage. Some statements can apply
to more than one type of storage.
USB flash
memory
Statement
HDD SSD drive
(✓) (✓) (✓)
it is non-volatile
(c) Julia uses a USB connection to transfer data onto her USB flash memory drive.
Benefit 1 ............................................................................................................................
...........................................................................................................................................
Benefit 2 ............................................................................................................................
...........................................................................................................................................
[2]
..................................................................................................................................... [1]
3 A firewall can be used to help keep the data secure that is stored on a computer.
(a) The given paragraph describes how the firewall operates to help keep the data secure.
Complete the paragraph using the most appropriate terms from the given list. Not all of the
terms on the list need to be used.
• Accept
• Criteria
• Hacking
• Input
• Network
• Outgoing
• Output
• Processor
• Reject
• Software
• Store
• Storage
the traffic based on this. It can help prevent ............................................ and malicious
(b) Identify three other methods that could be used to keep the data secure.
Method 1 ...................................................................................................................................
Method 2 ...................................................................................................................................
Method 3 ...................................................................................................................................
[3]
Phishing ...........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Pharming ..........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[6]
5 Jamelia has a greenhouse that she uses to grow fruit and vegetables. She needs to make sure
the temperature in the greenhouse stays between 25 °C and 30 °C (inclusive).
A system that has a temperature sensor and a microprocessor is used to maintain the temperature
in the greenhouse. The system will:
Describe how the system uses the temperature sensor and the microprocessor to maintain the
temperature in the greenhouse.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
Do not attempt to simplify the statement. All logic gates must have a maximum of two inputs.
B X
[6]
(b) Consider the completed truth table for the given logic statement.
1 0 0 0 0
2 0 0 1 1
3 0 1 0 0
4 0 1 1 1
5 1 0 0 0
6 1 0 1 1
7 1 1 0 0
8 1 1 1 1
There are four errors in the truth table in the output (X) column.
Row ........................
Row ........................
Row ........................
Row ........................
[4]
7 A music company has a website that allows users to stream music. The music is stored in sound
files.
(i) Describe how the sound files are compressed using lossless compression.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) State one reason why the music company would compress the sound files using
lossless, rather than lossy, compression.
...........................................................................................................................................
..................................................................................................................................... [1]
(iii) Give one benefit, to the user, of the music company compressing the sound files.
...........................................................................................................................................
..................................................................................................................................... [1]
(iv) Give one drawback of the music company using lossless, rather than lossy, compression
for the sound files.
...........................................................................................................................................
..................................................................................................................................... [2]
(b) Describe how the web pages for the website are requested and displayed on a user’s
computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(c) The web server that hosts the website suffers a denial of service (DoS) attack.
Explain why this will prevent users from accessing the website.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
8 Four 7-bit binary values are transmitted from one computer to another. A parity bit is added to
each binary value creating 8-bit binary values. All the binary values are transmitted and received
correctly.
(a) Identify whether each 8-bit binary value has been sent using odd or even parity by writing odd
or even in the type of parity column.
01100100
10010001
00000011
10110010
[4]
...................................................................................................................................................
............................................................................................................................................. [1]
(i) Describe how data is sent using parallel half-duplex data transmission.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
Drawback 1 .......................................................................................................................
...........................................................................................................................................
Drawback 2 .......................................................................................................................
...........................................................................................................................................
[2]
BLANK PAGE
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at [Link] after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
The words in bold in the mark scheme are important text that needs to be present, or some notion
of it needs to be present. It does not have to be the exact word, but something close to the
meaning.
A single forward slash means this is an alternative word. A double forward slash means that this is
an alternative mark point.
Ellipsis (…) on the end of one-mark point and the start of the next means that the candidate cannot
get the second mark point without being awarded the first one. If a MP has ellipsis at the beginning,
but there is no ellipsis on the MP before it, then this is just a follow-on sentence and can be
awarded without the previous mark point.
1 0 1 0 0 1 1 1
1 1 0 1 0 1 1 0
USB flash
memory
Statement
HDD SSD drive
() () ()
it is non-volatile
2(c)(ii) − Serial 1
3(a) One mark per each correct term in the correct order. 6
− Software
− Network
− Criteria
− Accept // reject
− Reject // accept
− Hacking
Phishing
− Legitimate looking email sent to user
− encourages user to click a link that directs user to a fake website
− User encouraged to enter personal details into a fake website // designed
to obtain personal details from a user
Pharming
− Malicious code/malware is downloaded/installed // software downloaded
without users' knowledge
− … that re-directs user to fake website (when legitimate URL entered)
− User encouraged to enter personal details into a fake website // designed
to obtain personal details from a user
5 Eight from: 8
− Sensor send data/readings/signal to microprocessor
− Data is converted from analogue to digital (using ADC)
− Microprocessor compares/checks data to stored values/range of values
…
− … If data is greater than 30 / above the range microprocessor sends
signal to open window and to turn heater off
− … If data is below 25 the microprocessor sends signal to turn on heater
and to close window
− … If data is between 25 and 30 / within the range no action taken
− Actuator is used to operate heater/window
− Whole process is continuous
6(a) One mark per each correct logic gate, with correct input: 6
6(b) − Row 1 4
− Row 3
− Row 4
− Row 5
8(a) − Odd 4
− Odd
− Even
− Even
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (LO) 215284
© UCLES 2021 [Turn over
2
(a) Complete the table to show the hexadecimal and 8-bit binary values of the given denary
values.
49
123
200
[6]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Benefit 1 ....................................................................................................................................
...................................................................................................................................................
Benefit 2 ....................................................................................................................................
...................................................................................................................................................
[2]
(c) Hexadecimal is used to represent Hypertext Markup Language (HTML) colour codes in
computer science.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
Tick (3) to show if the statement applies to magnetic, solid state or optical storage. Some
statements may apply to more than one type of storage.
..................................................................................................................................... [1]
..................................................................................................................................... [1]
(iii) Identify which type of storage would be the most suitable for use in a web server and
justify your choice.
Justification ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(c) Describe the operation of USB flash memory and how it stores data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Do not attempt to simplify the statement. All logic gates must have a maximum of two inputs.
B X
[6]
(b) Consider the completed truth table for the given logic statement.
2 0 0 1 1
3 0 1 0 1
4 0 1 1 0
5 1 0 0 1
6 1 0 1 0
7 1 1 0 1
8 1 1 1 1
There are four errors in the truth table in the output (X) column.
Row .......................
Row .......................
Row .......................
Row .......................
[4]
4 Three types of Internet security risk are virus, spyware and denial of service (DoS) attack.
Tick (3) to show whether the statement applies to virus, spyware or denial of service. Some
statements may apply to more than one Internet security risk.
Denial of
Statement Virus Spyware service
(3) (3) (3)
captures all data entered using a keyboard
is self-replicating
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(c) Some Internet security risks can maliciously damage data. Data can also be damaged
accidentally.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
5 A security light system is used by a factory. The light only comes on when it is dark and when
movement is detected. The light will stay on for 1 minute before switching off.
Sensors and a microprocessor are used to control the security light system.
(a) Identify two sensors that would be used in the security light system.
Sensor 1 ...................................................................................................................................
Sensor 2 ...................................................................................................................................
[2]
(b) Describe how the sensors and the microprocessor control the security light system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [8]
6 Cookies can be used to store a user’s personal data and online browsing habits.
(a) A cookie could be used to automatically enter a user’s payment details when the user makes
a purchase online.
Describe how cookies can be used to store and automatically enter a user’s payment details.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Explain why a user may be concerned about their personal data and online browsing habits
being stored in cookies.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
7 Jolene uses HTML to create a website. She separates the HTML into structure and presentation.
..................................................................................................................................... [1]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(b) Explain why Jolene separates the HTML into structure and presentation.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
8 A keyboard is a type of input device that can be used to enter data into a computer.
Complete the paragraph that describes one method of operation for a keyboard, using the most
appropriate terms from the given list. Not all terms in the list need to be used.
• Binary
• Breaks
• Calculated
• Character
• Circuit
• Current
• Information
• Network
• Press
• Processor
• Signal
• Switch
A keyboard has a key matrix underneath the keys. When a key is pressed, it presses a
............................................. map to find the ............................................. value for the key that
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at [Link] after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
The words in bold in the mark scheme are important text that needs to be present, or some notion
of it needs to be present. It does not have to be the exact word, but something close to the
meaning.
A single forward slash means this is an alternative word. A double forward slash means that this is
an alternative mark point.
Ellipsis (…) on the end of one-mark point and the start of the next means that the candidate cannot
get the second mark point without being awarded the first one. If a MP has ellipsis at the beginning,
but there is no ellipsis on the MP before it, then this is just a follow-on sentence and can be
awarded without the previous mark point.
49 31 00110001
123 7B 01111011
200 C8 11001000
2(b)(iii) One for type of storage, two for matching justification from: 3
− Magnetic // HDD
− (Web server) is likely to receive many requests a day
− (Web server) will likely need to store a lot of data and magnetic is high
capacity
− Magnetic is cheaper to buy for storage per unit than solid state
− Magnetic is capable of more of read/write requests over time // has more
longevity // SSD has more limited number of read/write requests (before
it is no longer usable)
− No requirement for it to be portable, so moving parts does not matter
− Solid-state // SSD
− (Web server) is likely to receive many requests a day
− (Web server) will likely need to store a lot of data and solid-state is high
capacity
− Solid-state is more energy efficient
− Solid-state runs cooler so will not overheat
− Solid state has faster read/write speeds to handle volume of traffic
3(a) One mark for each correct logic gate with correct input. 6
is self-replicating
COMPUTER SCIENCE
Paper 2210/11
Paper 11 Theory
Key messages
Candidates continue to demonstrate a good level of knowledge about the fundamental aspects of computer
science. It would be beneficial for candidates to consider the context that is given in some questions.
Candidates should look to reflect the application of this context in the knowledge and understanding they are
required to demonstrate. This would allow candidates to demonstrate a greater level of understanding,
beyond a general response, about the topic in question.
General comments
Candidates are reminded to make sure that they do not write outside the given writing space in a question. If
additional writing space is required, candidates should use the additional pages available. They should make
sure they clearly indicate the question for which they are providing a further response.
Question 1
(a) Most candidates were able to successful convert the two denary values to binary.
(b) (i) Many candidates were able to identify one similarity. Most candidates gave the response that they
can be used to identify a device.
(ii) Some candidates were able to provide two differences between the addresses. Some candidates
only provided one side of the comparison. Candidates are reminded that if they are asked to
provide a difference between two elements, they need to provide the information about the feature
or characteristic of both. The most common answers given were about the how the address is
assigned and that an internet protocol (IP) address can change, but a media access control (MAC)
address normally does not.
Question 2
(a) Many candidates were able to give three appropriate input devices. Some candidates gave three
storage devices, rather than input devices. Candidates are reminded to read all the information
provided in a question.
(b) Few candidates were able to provide a fully correct answer. Many candidates provided the correct
response for the bottom three rows. The most common errors were no tick for USB flash memory
drive using NAND gates and all three being non-volatile. It would be beneficial for candidates to
understand that USB flash memory drive and solid state drive (SSD) both operate using the
solid-state memory method.
(c) (i) Many candidates were able to provide two correct responses. The most common correct
responses were ‘cannot be inserted incorrectly’ and ‘supports different transmission speeds’. Some
candidates repeated the benefit given in the question or something similar, for example universal
connection, industry standard. It would be beneficial for candidates to have a wider understanding
of the benefits of a universal serial bus (USB) connection. Common incorrect answer referred to
the benefits of a USB flash memory drive, for example it is a portable device. It would be beneficial
© 2021
Cambridge Ordinary Level
2210 Computer Science June 2021
Principal Examiner Report for Teachers
for candidates to understand the difference between a USB connection and a USB device. It would
also be beneficial for candidates to make sure that they have read the question in full.
Question 3
(a) Many candidates were able to provide a full set of missing terms. The most common incorrect
answer was ‘It monitors traffic between the computer and the processor’.
(b) Most candidates were able to provide three correct methods that could be used to keep the data
safe. The most common incorrect answer was anti-spyware. It would be beneficial for candidates to
apply the context given in a question, and in this case understand that anti-spyware will not directly
keep stored data on a computer safe.
Question 4
Some candidates achieved the full marks available for this question. Many candidates demonstrated
understanding that both methods encourage a user to provide personal details. Many candidates lacked
accuracy in their answer, for example, understanding was provided that a legitimate looking email is sent in
phishing, but then only referred to the email being opened and that taking the user to a fake website. It would
be beneficial for candidates to understand that just opening the email is not enough to redirect the user to
the fake website.
Question 5
Many candidates gave a very generic answer to this question and did not apply the context given. It would
be beneficial for candidates to understand how to use the context given in a question and apply this to their
answer. It would be beneficial for candidates to show a greater level of accuracy in answer questions about
the application of sensors and microprocessors in a system. It would also be beneficial for candidates to
understand that the sensor continuously send data to the microprocessor and that it does not just do this
when it captures a certain value.
Question 6
(a) Candidates continue to show a high level of ability in their understanding of logic circuits. The most
common incorrect gate given was a NOR gate given in place of the XOR gate.
(b) Many candidates were able to provide the rows that required correction.
Question 7
(a) (i) Some candidates were able to achieve the full marks available for this question. Many candidates
demonstrated understanding that a compression algorithm is used. Many candidates then provided
an inaccurate understanding of the process. Most stated that data is not removed, but then stated
that sounds not heard by the human ear would be removed. Many candidates also referred to
repeating words being identified and indexed. It would be beneficial for candidates to have a
greater understanding of how a lossless compression method is used to compress sound. It would
also be beneficial for candidates to use the context given in the question and apply this to their
answer.
(ii) Some candidates identified that the company would look to do this to have the highest quality for
the music. Many candidates lacked accuracy in their answer and stated that no data is lost. It
would be beneficial to candidates to provide more detail than this about how that would be better
for the music company.
(iii) Many candidates were able to provide a correct response. The most common correct answer being
that it allowed for quicker streaming of the data.
(iv) Some candidates were able to provide a correct response. Many candidates reverted back to
incorrectly stating that sounds not heard by the human ear would be removed. The most common
correct answer was that it would be create a larger file size so will take more storage space. It
© 2021
Cambridge Ordinary Level
2210 Computer Science June 2021
Principal Examiner Report for Teachers
would be beneficial for candidates to have a greater understanding of the drawbacks of lossless
compression in this context.
(b) Some candidates demonstrated an accurate understanding of how web pages are requested and
displayed. It would be beneficial for candidates to have an accurate understanding of the role of the
web browser and the web server in this context.
(c) Many candidates explained the operation of a denial of service (DoS) attack. This did mean they
managed to achieve the marks in most cases, but it would be beneficial for candidates to answer
the question given, instead of providing a generic response.
Question 8
(a) Many candidates were able to provide the correct parity. Some candidates did not provide a correct
response, instead adding a 1 or a 0 to the parity bit. This did not show understanding of the parity
type that had been used.
(b) Many candidates correctly identified that a transposition error could have occurred. Some
candidates effectively gave this by example.
(c) (i) Many candidates were able to correctly describe how data is sent using this method. It would be
beneficial for candidates to show greater accuracy in their response, for example some stated that
multiple bits are sent, but did not state this happens at the same time. Multiple bits are sent in both
serial and parallel, the difference being they are not sent at the same time in serial.
(ii) Many candidates were able to give two correct drawbacks. The most common correct answers
were that the bits may arrive skewed and that it does not work well over long distances.
© 2021
Cambridge Ordinary Level
2210 Computer Science June 2021
Principal Examiner Report for Teachers
COMPUTER SCIENCE
Paper 2210/12
Paper 12 Theory
Key messages
Candidates continue to demonstrate a good level of knowledge about the fundamental aspects of computer
science. It would be beneficial for candidates to consider the context that is given in some questions.
Candidates should look to reflect the application of this context in the knowledge and understanding they are
required to demonstrate. This would allow candidates to demonstrate a greater level of understanding,
beyond a general response, about the topic in question.
General comments
Candidates are reminded to make sure that they do not write outside the given writing space in a question. If
additional writing space is required, candidates should use the additional pages available. They should make
sure they clearly indicate the question for which they are providing a further response.
Question 1
(a) Most candidates were able to provide the correct hexadecimal and binary values.
(b) Most candidates were able to provide two benefits. It would be beneficial for candidates to be
accurate with their response, some gave ‘uses less space’ but did not refer to where the space was
saved. The most common incorrect answer was ‘uses less storage space’. It would be beneficial
for candidates to understand that hexadecimal will be stored as a binary value, so no storage
space will be saved.
(c) Many candidates were able to give three ways hexadecimal is used. Some candidates repeated
the response given in the question. It would be beneficial for candidates to read the context of the
question and not just provide a generic answer to the question.
Question 2
(a) Few candidates were able to provide a fully correct answer. The most common correct answers
were rows 1 and 4. The most common incorrect answers were rows 2 and 6. Many candidates
ticked that pits and lands are used to store data for magnetic storage. It would be beneficial for
candidates to have a greater understanding of the operation of magnetic and optical storage.
(b) (i) Most candidates were able to give a correct example of storage. The most common incorrect
answer was USB flash memory.
(ii) Most candidates were able to give a correct example of storage. The most common incorrect
answer was hard disk drive (HDD).
(iii) Many candidates were able to give a suitable type of storage. Some candidates incorrectly gave
optical storage. It would be beneficial for candidates to understand that optical storage is not
suitable for this context and the reasons why. The most common justifications for magnetic is that it
has a high capacity for data storage and that it has more longevity. The most common justifications
for solid state were, it has faster read/write speeds and that it has a high storage capacity. Some
candidates tried to justify that it has no moving parts so is portable. It would be beneficial for
© 2021
Cambridge Ordinary Level
2210 Computer Science June 2021
Principal Examiner Report for Teachers
candidates to apply the context of the question and recognise that a web server would not likely be
a portable device and therefore not a suitable justification.
(c) Very few candidates achieved marks for this question. It would be beneficial for candidates to read
the question in full. Most candidates described the benefits of a USB connection or a USB drive. It
would be beneficial for candidates to understand that USB flash memory is a type of solid-state
storage and operates in the same way.
Question 3
(a) Candidates continue to show a high level of ability in their understanding of logic circuits. The most
common incorrect gate given was a XOR gate given in place of the NOR gate.
(b) Many candidates were able to provide the rows that required correction.
Question 4
(a) Some candidates were able to provide a fully correct answer. The most common incorrect
response was candidates who ticked that denial of service (DoS) can be installed onto a web
server. It would be beneficial for candidates to understand that a DoS attack prevents access to a
webserver, but it is not installed onto one.
(c) Many candidates were able to give three correct responses. The most common incorrect
responses were further responses stating how data would be maliciously damaged. It would be
beneficial for candidates to understand the difference between the ways that data could be
maliciously damaged and accidentally damaged.
Question 5
(a) Many candidates gave two correct sensors that could be used. The most common incorrect sensor
given was pressure sensor, but this was not applicable to the context.
(b) Many candidates gave a very generic answer to this question and did not apply the context given. It
would be beneficial for candidates to understand how to use the context given in a question and
apply this to their answer. It would be beneficial for candidates to show a greater level of accuracy
in answer questions about the application of sensors and microprocessors in a system. It would
also be beneficial for candidates to understand that the sensor continuously sends data to the
microprocessor and that it does not just do this when it captures a certain value.
Question 6
(a) Very few candidates showed understanding of how cookies can be used in this context. Many
described a generic purpose of a cookie, and most repeated the question stating that the cookie
would store the user's payment details. It would be beneficial for candidates to have a greater
understanding of the use of cookies.
(b) Some candidates were able to provide understanding of the issue that a person’s computer could
be hacked, and the information stored by the cookies could be obtained. Very few candidates were
able to provide understanding beyond this. It would be beneficial for candidates to have a greater
understanding of the concerns regarding the use of cookies.
Question 7
(a) (i) Most candidates were able to give a suitable example of Hypertext Markup Language (HTML)
structure.
(ii) Most candidates were able to give suitable examples of HTML presentation.
(b) Few candidates were able to provide reasons as to why the structure and presentation would be
separated. Most gave a definition of what is meant by the structure and the presentation, and
© 2021
Cambridge Ordinary Level
2210 Computer Science June 2021
Principal Examiner Report for Teachers
repeated example of this. The most common correct response was that it means the style of the
website can be easily edited.
Question 8
Many candidates were able to provide a fully correct set of missing terms. The most common incorrect
answer was information map in place of character map.
© 2021
Cambridge O Level
* 0 1 9 0 3 8 4 7 8 1 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CE/FC) 221490
© UCLES 2021 [Turn over
2
Tick (✓) one box to show whether denary is a base-2, base-10 or base-16 number system.
Tick
(✓)
Base-2
Base-10
Base-16
[1]
05 ......................................................
20 ......................................................
1A ......................................................
AB ......................................................
[4]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Tick (✓) one box to show the correct 8-bit binary value for each hexadecimal value.
Tick
(✓)
00011001
00100101
10100001
[1]
Tick
(✓)
00011011
10110001
00011010
[1]
(d) (i) Give one way that hexadecimal is used in website development.
..................................................................................................................................... [1]
..................................................................................................................................... [1]
2 A train company wants to install a self-service ticket machine system for its train stations. When
the customer has purchased their tickets, the machine will provide a paper ticket.
(a) One output device that is used in the ticket machine is a display screen.
Identify one other output device that is used in the ticket machine system.
............................................................................................................................................. [1]
(b) The train company does not want users to use a keyboard or a mouse to enter their data,
when buying a ticket. The company is worried that they may be stolen or get too dirty.
Identify one other input device that would be suitable for use in the ticket machine system, to
allow users to enter their data.
............................................................................................................................................. [1]
Tick (✓) to show if each statement applies to serial simplex, parallel simplex, parallel
half-duplex or serial duplex data transmission. Some statements may apply to more than one
data transmission method.
(b) A Universal Serial Bus (USB) connection can be used to transmit data from a mobile device
to a computer.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
Benefit 3 ...................................................................................................................................
...................................................................................................................................................
[3]
Complete the paragraph using the list of terms. Not all terms in the list need to be used.
• capacitive
• change
• circuit
• conductive
• coordinates
• grid
• heat
• infra-red
• insulating
• light
• manufacture
• pressure
• resistive
top layer of the screen and makes it connect with the bottom layer to complete a
............................................................................ .
5 Sammi works for a finance company and has a laptop that he uses for his work. He has confidential
data about his customers stored on his laptop.
(a) Sammi is concerned about his customers’ confidential data being viewed by other people in
his office.
Identify three other methods Sammi could use to prevent his customers’ confidential data
being viewed.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(b) Sammi creates videos for the finance company website that give customers advice about
their finances.
He uses lossy compression to reduce the file size of the videos for the website.
(i) Give three ways that lossy compression can reduce the file size of the videos.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(ii) Give one drawback of using lossy compression to reduce the file size of the videos.
...........................................................................................................................................
..................................................................................................................................... [1]
(c) Sammi could have used lossless compression to compress the videos for the website.
(i) Give one reason why he would use lossless compression, rather than lossy compression,
for the videos.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Give two disadvantages of Sammi using lossless compression, rather than lossy
compression, for the videos.
Disadvantage 1 .................................................................................................................
...........................................................................................................................................
Disadvantage 2 .................................................................................................................
...........................................................................................................................................
[2]
6 A programmer can use translators, such as an interpreter and a compiler, when developing a
computer program.
...................................................................................................................................................
............................................................................................................................................. [1]
Difference 1 ..............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Difference 2 ..............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
............................................................................................................................................. [1]
Tick (✓) to show if each statement applies to a 3D scanner, barcode reader or a Quick Response
(QR) code reader. Some statements may apply to more than one type of device.
3D Barcode QR code
Statement scanner reader reader
(✓) (✓) (✓)
uses position and alignment markers for orientation
when scanning
8 An electronic game has three square mats that are coloured red, green and blue.
The player will see a colour displayed on a screen and has 1 second to hit the mat that matches
the colour. If the player hits the correct mat, within 1 second, a counter is incremented. When a
player hits an incorrect mat, the game ends.
The game uses sensors and a microprocessor to determine if the player hits the correct mat within
1 second.
Explain how the game uses sensors and a microprocessor to count the number of times a player
hits a correct mat within 1 second.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [7]
An interrupt is generated to inform the Central Processing Unit (CPU) that the application has
been opened.
(a) Give three other examples of when an interrupt signal could be generated.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(b) State what would happen if interrupt signals were not used in a computer.
...................................................................................................................................................
............................................................................................................................................. [1]
10 Jermain uses the Secure Socket Layer (SSL) protocol for secure transmission when sending data
using the internet.
(a) Explain how the SSL protocol secures the data for transmission.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Identify an alternative protocol that could be used for secure transmission of data using the
internet.
............................................................................................................................................. [1]
(c) Give two ways that a user can identify if a website uses secure data transmission.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2021 2210/12/O/N/21 [Turn over
10
Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.
B X
[5]
(b) Complete the truth table for the given logic statement.
A B C Working space X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(c) Identify two logic gates that are not included in the given logic statement.
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at [Link] after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2021 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
1(a) − Base-10 1
1(b) − 5 4
− 32
− 26
− 171
1(c)(i) − 00100101 1
1(c)(ii) − 00011011 1
6(c) − Assembler 1
can often be built into an Electronic Point Of Sale (EPOS) terminal, for ()
example, a supermarket checkout
8 Seven from: 7
− Timer is started
− Pressure sensor (within each mat)
− Sensor sends data to microprocessor
− Analogue data is converted to digital (using ADC)
− Microprocessor compares data to stored value(s)
− If data matches / in/out range microprocessor stops timer
− If data matches / in/out range microprocessor checks if data has come from correct colour mat sensor
− If data matches / in/out range microprocessor checks to see if timer is stopped at less than 1 second
− If data matches / in/out range microprocessor increments counter if timer is less than 1 second and colour/mat is
correct
− If correct colour/mat is hit, timer is reset and the whole process is repeated
− If data has not come from the correct colour mat sensor the game ends
NOTE: If three suitable different errors are described, this can be awarded three marks.
10(a) − Enables an encrypted link (between the browser and the web server) // It encrypts the data 2
− … based on the authentication of an (SSL) certificate // and will only send it if the certificate is authentic
11(a) One mark per each correct logic gate with correct input(s) 5
B X
A B C Working space X
0 0 0 1
0 0 1 1
0 1 0 1
0 1 1 1
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 0
11(c) − NOR 2
− XOR / EOR
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CJ) 312483
© UCLES 2022 [Turn over
2
(a) (i) Tick (3) to show which type of data is stored in an MP3 file.
Tick (3)
Video
Sound
Image
[1]
(ii) Tick (3) to show whether the MP3 file is a lossy compressed file or a lossless compressed
file or not a compressed file.
Tick (3)
2 A computer is designed using the Von Neumann model for a computer system.
(a) Data is fetched from primary storage into the CPU to be processed.
(i) State the name of the primary storage from where data is fetched.
..................................................................................................................................... [1]
(ii) The CPU performs a cycle to process data. Fetch is the first stage in this cycle.
State the names of the second and third stages in the cycle.
(iii) Identify two components within the CPU that are used in the fetch stage of the cycle.
Component 1 .....................................................................................................................
Component 2 .....................................................................................................................
[2]
3 Three types of storage media are magnetic, optical and solid state.
............................................................................................................................................. [1]
(b) Optical storage uses a laser to store and read data from a disk.
Explain how the laser is used to store and read data from the disk.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) A business is creating a new mobile device that has an SSD as secondary storage.
(i) Give three reasons why an SSD is the most suitable secondary storage for their mobile
device.
Reason 1 ...........................................................................................................................
...........................................................................................................................................
Reason 2 ...........................................................................................................................
...........................................................................................................................................
Reason 3 ...........................................................................................................................
...........................................................................................................................................
[3]
(ii) Identify two examples of software that can be stored on the SSD.
Example 1 .........................................................................................................................
Example 2 .........................................................................................................................
[2]
4 All data needs to be converted to binary data so that it can be processed by a computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) The denary values 64, 101 and 242 are converted to 8‑bit binary values.
64 ..............................................................................................................................................
101 ............................................................................................................................................
242 ............................................................................................................................................
[3]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
42 ..............................................................................................................................................
CE .............................................................................................................................................
[4]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
5 An image is stored on a computer. The image is 16‑bit colour and is 100 pixels high and
150 pixels wide.
Calculate the file size of the image in bytes. Show all your working.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
(a) One similarity between a compiler and an interpreter is that they both translate high‑level
language into machine code.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
7 Adele chooses to set a biometric password for her mobile device, instead of a
personal identification number (PIN).
...................................................................................................................................................
............................................................................................................................................. [1]
(b) Give two reasons why a biometric password is more secure than a PIN.
Reason 1 ..................................................................................................................................
...................................................................................................................................................
Reason 2 ..................................................................................................................................
...................................................................................................................................................
[2]
The firewall gathers data about the traffic coming into and going out of her mobile device.
Explain how the firewall uses the gathered data to keep the mobile device more secure.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(d) Adele also encrypts the data on her mobile device to keep it more secure.
...................................................................................................................................................
............................................................................................................................................. [1]
BLANK PAGE
Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.
B X
[6]
(b) Complete the truth table for the given logic statement.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
9 Three Internet terms are browser, Internet Protocol (IP) address and
Uniform Resource Locator (URL).
Tick (3) to show which statements apply to each Internet term. Some statements may apply to
more than one Internet term.
it is a type of software
it is a type of address
it stores cookies
[5]
Feature 1 ..........................................................................................................................................
..........................................................................................................................................................
Feature 2 ..........................................................................................................................................
..........................................................................................................................................................
Feature 3 ..........................................................................................................................................
..........................................................................................................................................................
[3]
11 (a) The paragraph describes the process of printing a document using an inkjet printer.
Complete the paragraph using the most appropriate terms from the list. Not all of the terms in
the list need to be used.
• binary
• buffer
• drum
• information
• interrupt
• laser
• liquid
• nozzles
• operating system
• powder
• thermal bubble
• toner
Data is sent from the computer to the printer. The data is held in a print
processed to be printed.
technology.
If the paper jams in the printing process, the printing stops and an
Example 1 .................................................................................................................................
Example 2 .................................................................................................................................
Example 3 .................................................................................................................................
[3]
Example 1 .................................................................................................................................
Example 2 .................................................................................................................................
Example 3 .................................................................................................................................
[3]
© UCLES 2022 2210/11/M/J/22 [Turn over
12
Identify and describe three ethical issues that could be a concern when using the Internet.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at [Link] after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2022 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
The words in bold in the mark scheme are important text that needs to be present, or some notion of it needs to be present. It does not have to
be the exact word, but something close to the meaning.
A single forward slash means this is an alternative word. A double forward slash means that this is an alternative mark point.
Ellipsis (…) on the end of one-mark point and the start of the next means that the candidate cannot get the second mark point without being
awarded the first one. If a mark point has an ellipsis at the beginning, but there is no ellipsis on the mark point before it, then this is just a follow-on
sentence and can be awarded without the previous mark point.
1(a)(i) Sound 1
Second stage
Decode
Third stage
Execute
4(b) 01000000 3
01100101
11110010
5 Two marks for two correct stages of working, one mark for correct final answer 3
100 150
15 000 16 // 15 000 2
240 000 / 8
30 000 bytes
An interpreter translates the code line by line (and executes each line immediately)
… whereas a compiler translates the whole code at the same time (before executing it)
8(a) One mark for each correct logic gate with correct input(s) 6
A B C Working space X
0 0 0 0
0 0 1 1
0 1 0 0
0 1 1 1
1 0 0 0
1 0 1 1
1 1 0 0
1 1 1 1
it is a type of software
it is a type of address
it stores cookies
It is a unique address
It is assigned by the manufacturer
It can be used to identify a device
It contains the manufacturer ID/code/number
It contains the serial code/number
It is written in hexadecimal
It has 6 bytes/48 bits/6 pairs of digits
Does not (usually) change // static
11(a) One mark for each of the correct terms, in the correct place 5
buffer
nozzles
liquid
thermal bubble
interrupt
Monitor // screen
Speaker
Headphones
Light // LED
(2D/3D) cutter
DLP // LCD projector
Actuator
Keyboard
Mouse // trackerball
Microphone
(2D/3D) scanner
Barcode reader
QR code reader
Digital camera // webcam
Interactive whiteboard
Touchscreen
Sensor
12 One mark for identification of an issue and one mark for a description e.g.: 6
Plagiarism
– The copying of other people’s work without their permission
– Claiming someone else’s work as your own
Hacking
– Unauthorised access to a computer/data
Malware
– Malicious software designed to damage a computer system or stored data
Spyware
– Keylogger used to record keypresses and sends them to third party
Ransomware
– Holding hostage a user’s data, often for a release fee
Breaching copyright
– Breaking the law by copying someone’s work
Piracy
– Using piracy websites to gain content for free that should have been paid for
Privacy
– A person’s data could be leaked
Phishing
– Sending an email to lure users to a fake site to obtain their personal details
12 Pharming
– Downloading of malicious code to redirect user to fake website to obtain their personal details
Data protection
– A person’s data is not used according to the law
Cyber bullying
– Using the internet to bully people
Inappropriate materials
– Materials that could cause harm/offense to people e.g. minors
Fake news
– News stories that could be very misleading or harmful
Software cracking
– Changing code to e.g. bypass a licence for software
Addiction
– Aspects of the internet e.g. social media can cause this
Environmental effects
– Increased use of the internet increases the use of electrical power
COMPUTER SCIENCE
Paper 2210/11
Paper 11 Theory
Key messages
Candidates often gave appropriate responses to the questions and justified their responses when required.
Candidates continue to show a strong ability in logic questions. Candidates showed an increasing
understanding of the command words and their requirements for their answer.
General comments
Candidates need to carefully read the questions to make sure they are giving answers that are appropriate in
the context. Their answers should also take these contexts into account, making sure that the points they
make are relevant to the context.
Question 1
(a) (i) Most candidates provided the correct response. The most common incorrect response was video.
(ii) Most candidates provided the correct response. The most common incorrect response was that it is
not a compressed file.
Question 2
(a) (i) Many candidates gave the correct response. It would be beneficial for candidates to be accurate
with their response. Some candidates gave a response that was not accurate enough such as
memory unit.
(ii) Many candidates gave the correct response. Most candidates were able to provide the execute
stage.
(iii) Many candidates were able to provide at least two correct components.
Question 3
(a) Many candidates provided the correct response. It would be beneficial for candidates to be
accurate with their response. Some candidates gave a response that was not accurate enough
such as USB. This is too vague as this could refer to several things such as a cable, a connection
or a transmission method, as well as a storage device.
(b) Some candidates were able to provide a correct response. Most candidates were able to gain a
mark for understanding a laser it shone at the disk. It would be beneficial for candidates to have a
more accurate and detailed understanding of the operation of optical storage.
(c) (i) Many candidates were able to provide a correct response. The most common correct answers
were relating to size and durability.
(ii) Many candidates were able to provide a correct response. It would be beneficial for candidates to
understand that if brand names are given for software they cannot be considered.
© 2022
Cambridge Ordinary Level
2210 Computer Science June 2022
Principal Examiner Report for Teachers
Question 4
(a) Some candidates were able to give a correct response. Many candidates stated that a computer
only understands binary. It would be beneficial for candidates to know and demonstrate the use of
logic gates in a computer and how this relates to binary data.
Question 5
Many candidates were able to gain marks for some correct working, but few candidates were able to provide
a correct answer.
Question 6
(a) (i) Many candidates recognised that they both checked for errors. It would be beneficial for candidate
to understand that the translators check for errors, but they do not debug the errors. Some
candidates stated that they both debug errors.
(ii) Many candidates were able to provide a correct response. The most common correct answers
related to the translation of the code and the reporting of errors.
Question 7
(a) Some candidates were able to provide a correct response. Some candidates provided examples of
a biometric device, this was not enough detail for a correct response.
(b) Many candidates provided a correct response. The most common correct answer was that a
biometric password cannot be guessed.
(c) Some candidates were able to provide a correct response. It would be beneficial for candidates to
understand that if they are given context in a question, they should apply their answer to the
context. Many candidates did not apply their answer to the context given.
(d) Many candidates were able to provide a correct response. It would be beneficial for candidates to
understand that it will not stop the data being stolen.
Question 8
(a) Many candidates were able to provide a correct response. The most common incorrect response
was the incorrect placement of the NOT gate before the NOR gate.
Question 9
Some candidates were able to provide a correct response. The most common incorrect responses were IP
addresses containing the domain name and URL not given as a type of address.
Question 10
Many candidates gave a correct response with a wide range of answers seen from candidates.
Question 11
(a) Most candidates gave a correct response. The most common incorrect responses were for buffer.
(b) Most candidates gave a correct response. It would be beneficial for candidates to make sure that
they have read all the information in the question as some candidates gave printer as their
response.
© 2022
Cambridge Ordinary Level
2210 Computer Science June 2022
Principal Examiner Report for Teachers
Question 12
Most candidates were able to name three ethical issues. Some candidates went on to provide a
suitable description.
© 2022
Cambridge O Level
* 9 5 1 7 3 9 7 8 7 8 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CJ) 312484
© UCLES 2022 [Turn over
2
Draw one line from each denary value to the correctly converted 8‑bit binary value.
00100001
41
10100110
00101001
174
10000110
10101110
86
01010110
[3]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Give the correct denary value for the 12‑bit binary value 000101010111
Show all your working.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(a) Give the 8‑bit binary value that would be stored for each pair of hexadecimal digits.
2F
15
D6
[6]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(b) HTML colour codes and Media Access Control (MAC) addresses are two examples of where
hexadecimal is used in Computer Science.
Give two other examples of where hexadecimal can be used in Computer Science.
Example 1 .................................................................................................................................
Example 2 .................................................................................................................................
[2]
Structure ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Presentation .............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(d) Explain why presentation is often separated from structure when creating a web page.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(a) The table contains five terms or definitions that relate to the Internet.
Term Definition
........................................................................................
browser ........................................................................................
........................................................................................
........................................................................................
........................................................................................
........................................................................................
cookie ........................................................................................
........................................................................................
[5]
(b) Joelle uses a firewall to keep her data safe when she uses the Internet.
Tick (3)
(c) Joelle’s parent also uses the firewall to limit the websites that Joelle can access.
Explain how the firewall is used to limit the websites that Joelle can access.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Jason wants to distribute a computer program he has written. He is considering distributing it
to users as freeware or free software.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Explain one benefit to a user if the program is distributed as free software.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.
B X
[5]
(b) Complete the truth table for the given logic statement.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(a) Identify two online security attacks that can be carried out using email.
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
One security method to keep data safe from online attacks is a firewall.
Identify two other security methods that keep data safe from online attacks.
One example of how data can be damaged accidentally is by shutting down a computer
before saving data. To prevent this from happening, a user should make sure they have
saved all data before shutting down a computer.
Complete the table by giving three other examples of how data can be damaged accidentally.
...................................................................... ......................................................................
...................................................................... ......................................................................
...................................................................... ......................................................................
......................................................................
...................................................................... ......................................................................
...................................................................... ......................................................................
...................................................................... ......................................................................
......................................................................
...................................................................... ......................................................................
...................................................................... ......................................................................
...................................................................... ......................................................................
......................................................................
[6]
7 Cassie stores data for her business every day. She stores the data using optical data storage.
Example 1 .................................................................................................................................
Example 2 .................................................................................................................................
Example 3 .................................................................................................................................
[3]
(b) Six statements are given about the operation of three different types of storage.
Tick (3) to show which statements apply to each type of storage. Some statements may
apply to more than one type of storage.
Type of storage
Magnetic Optical Solid state
Statement
(3) (3) (3)
[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Identify three ethical issues that may need to be considered when developing and distributing
software.
Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at [Link] after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2022 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
The words in bold in the mark scheme are important text that needs to be present, or some notion of it needs to be present. It does not have to
be the exact word, but something close to the meaning.
A single forward slash means this is an alternative word. A double forward slash means that this is an alternative mark point.
Ellipsis (…) on the end of one-mark point and the start of the next means that the candidate cannot get the second mark point without being
awarded the first one. If a mark point has an ellipsis at the beginning, but there is no ellipsis on the mark point before it, then this is just a follow-on
sentence and can be awarded without the previous mark point.
00100001
41 10100110
00101001
174
10000110
86 10101110
01010110
1(b) One mark for correct working, one mark for correct answer 2
Working e.g.
256 64 16 4 2 1
Answer:
343
2(a) Two marks each correct conversion (one mark for the first four bits, one mark for the second four bits) 6
0 0 1 0 1 1 1 1
2F
0 0 0 1 0 1 0 1
15
1 1 0 1 0 1 1 0
D6
2(c) One mark for a description, one mark for a correct example 4
Structure
Layout of the web page
e.g. Where text is placed
Presentation
Formatting of the web page
e.g. the colour of the font
The formatting of the page can be changed/edited without needing to alter the structure
… so, they can make regular updates without needing to check the structure
Term Definition
HTTP // HTTPS this is a protocol that is used to send data for web
pages across the Internet
(The parent can) set criteria for the websites she is allowed to visit
… such as a whitelist/blacklist of websites
The firewall will examine the data/traffic incoming and outgoing from her computer
If data is sent from a website that is not allowed, it will be blocked
5(a) One mark for each correct logic gate with correct input(s) 5
A B C Working space X
0 0 0 0
0 0 1 0
0 1 0 0
0 1 1 1
1 0 0 0
1 0 1 0
1 1 0 0
1 1 1 1
6(a) One mark for identifying the attack, two marks for the description 6
Phishing
Email is sent to user to encourage them to click link
… that takes user to fake website
Pharming
Email is sent to user to encourage them to click link/download attachment
… that triggers download of malicious code that will redirect user to fake website
Virus/malware
Email is sent to user to encourage them to click link/download attachment
… that triggers download of virus/malware
Encryption
Password
Two-step / Two-factor authentication/verification
Biometric device
Anti-malware // Anti-virus
Proxy-server
6(c) One mark for identifying an issue, one mark for suggesting a suitable prevention 6
Software failure
Making sure it is always up to date // enable automatic updates
CD
DVD
Blu-ray
Type of storage
e.g.
Copyright
Plagiarism
Production/distribution of malware
Intellectual property theft
Privacy of data
Age appropriation
Offensive materials
Environmental impact of distribution media e.g. CDs
Accessibility of software
Security of software
Following guidelines of professional bodies e.g. ACM/IEEE/BCS
COMPUTER SCIENCE
Paper 2210/12
Paper 12 Theory
Key messages
Candidates often gave appropriate responses to the questions and justified their responses when required.
Candidates continue to show a strong ability in calculations and logic questions. Candidates showed and
increasing understanding of the command words and their requirements for their answer.
General comments
Candidates need to carefully read the questions to make sure they are giving answers that are appropriate in
the context. Their answers should also take these contexts into account, making sure that the points they
make are relevant to the context.
Question 1
(b) Most candidates were able to provide a correct response. Some candidates did not show their
working.
Question 2
(a) Many candidates were able to provide a correct response. Some candidates converted 15 as
though it were a denary value, rather than a hexadecimal value.
(b) Many candidates were able to provide a correct response. Candidates are reminded to read all the
information given in the question. Some candidates gave HTML colour codes and MAC address as
their response. These could not be considered as they were given in the question.
(c) Many candidates were able to describe presentation and provide a suitable example. Few
candidates were able to describe structure and provide a suitable example.
(d) Few candidates were able to provide accurate reasons for the separation of the two parts. Many
candidates gave a vague response about it being easier to create the web page if they are
separated. It would be beneficial for candidates to have a greater understanding of the reasons for
the separation of structure and presentation.
Question 3
(a) Many candidates provided a suitable response for ISP and HTTP. Some candidates were able to
provide a suitable response for browser. It would be beneficial for candidates to understand that a
web browser is a piece of software. This information was missing from many candidates’
responses. Few candidates were able to provide a suitable response for cookie. Many stated what
a cookie stores, but few referred to it being a file.
(b) Many candidates were able to provide a correct response. The most common incorrect response
was that a firewall is software based only.
© 2022
Cambridge Ordinary Level
2210 Computer Science June 2022
Principal Examiner Report for Teachers
(c) Few candidates were able to provide a fully correct answer. Candidates are reminded that if they
are given context in a question that this should be applied to their response. Many candidates gave
a generic description of the operation of a firewall and did not apply this to the context given.
Question 4
(a) Some candidates were able to provide a correct response. Many candidates gave advantages of a
high-level language rather than a description of what it is.
(b) (i) and (b)(ii) Many candidates were able to provide a correct response. The most common errors were
confusing the two types of software.
Question 5
(a) Many candidates were able to provide a correct response. The most common incorrect response
was the incorrect placement of the NOT gate before the XOR gate.
Question 6
(a) Many candidates were able to name two suitable methods. The most common two methods given
were phishing and pharming. Some candidates were able to provide a suitable description. It would
be beneficial for candidates to understand that a user needs to click on a link or an attachment to
open the fake web page or trigger a download of malicious code, and not just open the email.
(c) Many candidates were able to provide three correct issues. Some candidates were able to give a
prevention for each. It would be beneficial for candidates to understand that a back-up of data is
not a method to help prevent the data being damaged. It can server to replace the data if it is
damaged, but it does not stop the data being damaged.
Question 7
(b) Few candidates were able to provide a fully correct response. It would be beneficial for candidates
to have a greater understanding of the operation of the different types of storage.
Question 8
(b) Many candidates were able to provide a correct response. Some candidates did not apply their
response to the context given in the question and did not relate their response to software
development.
© 2022
Cambridge O Level
* 3 4 3 6 3 5 8 3 0 1 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CJ) 318821
© UCLES 2022 [Turn over
2
A customer can use the ticket machine to select and pay for their ticket.
One input device built into the ticket machine is a touch screen.
(a) Identify two other input devices that could be built into the ticket machine.
(b) The ticket machine has a help icon that a user can touch to contact customer support.
The ticket machine has an output device that allows the user to hear the customer support
person.
............................................................................................................................................. [1]
(c) The touch screen for the ticket machine uses resistive technology.
(i) Describe how resistive touch screen technology operates to recognise a user’s touch.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) Give two benefits of using resistive touch screen technology for the ticket machine.
Benefit 1 ............................................................................................................................
...........................................................................................................................................
Benefit 2 ............................................................................................................................
...........................................................................................................................................
[2]
(iii) Give two drawbacks of using resistive touch screen technology for the ticket machine.
Drawback 1 .......................................................................................................................
...........................................................................................................................................
Drawback 2 .......................................................................................................................
...........................................................................................................................................
[2]
(iv) Identify one other touch screen technology that could have been used.
..................................................................................................................................... [1]
(d) The computer in the ticket machine uses the stored program concept.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
One function of the operating system is to provide an interface for the user.
Function 1 .................................................................................................................................
Function 2 .................................................................................................................................
Function 3 .................................................................................................................................
[3]
(f) The computer uses 12-bit binary registers to store data whilst it is being processed.
(i) Give the 12-bit binary value that is stored in the register for each denary ticket number.
100 ....................................................................................................................................
235 ....................................................................................................................................
301 ....................................................................................................................................
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(ii) Show the denary ticket number that would be given to the customer for each 12-bit binary
value.
000000010110 ...................................................................................................................
000001110111 ...................................................................................................................
001101011001 ...................................................................................................................
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
Show the hexadecimal value that represents each of the two 12-bit binary values.
000010010101 ..................................................................................................................
101011010001 ...................................................................................................................
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
2 An automated water tap system uses a sensor and a microprocessor to operate. Water flows
from the tap when a person’s hands are placed underneath the tap. Water stops flowing when the
person’s hands are removed from underneath the tap.
(a) Explain how the water tap system uses a sensor and a microprocessor to operate.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
Identify the most suitable sensor that could be used in each system.
it checks the air is dry enough in a garage that spray paints cars
it checks that the soil in a greenhouse has the correct level of acidity
[3]
3 Five statements are shown about Random Access Memory (RAM), an internal
Solid State Drive (SSD) and a USB flash memory drive.
Tick (✓) to show which statements apply to each component. Some statements may apply to
more than one component.
Component
Internal USB flash
RAM
Statement SSD memory drive
(✓)
(✓) (✓)
it is volatile
State two methods she could use to help prevent accidental loss of data in this way.
Describe how each method would help prevent accidental loss of the data.
Method 1 ..........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Method 2 ..........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
5 8 bytes of data are transmitted from one computer to another. Each byte of data has a parity bit.
The data is also sent with a parity byte. Each bit in the parity byte allows a check to be performed
on each column of bits.
A parity check is performed on the data and an error is found in one bit. The table shows the data
that was received.
Parity
Bit 2 Bit 3 Bit 4 Bit 5 Bit 6 Bit 7 Bit 8
bit
Byte 1 0 1 0 1 0 0 1 1
Byte 2 1 0 0 1 1 1 1 1
Byte 3 1 1 1 1 1 1 0 0
Byte 4 1 1 0 1 0 1 0 1
Byte 5 1 0 0 0 1 1 1 0
Byte 6 1 1 1 0 1 0 1 1
Byte 7 1 1 0 0 1 1 0 0
Byte 8 1 1 1 1 0 0 1 1
Parity
1 0 1 1 0 1 1 1
byte
Identify which bit has an error by giving the Byte number and Bit number.
Explanation ......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
6 Jian has a website that uses the Secure Socket Layer (SSL) protocol to make sure that data is
kept secure during transmission.
(a) Give two ways that a user could check that a website uses the SSL protocol.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) State the name of the updated version of the SSL protocol.
............................................................................................................................................. [1]
Explain why Jian uses a proxy server as part of the system for his website.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(d) Jian sells products using his website. He wants to create a secure login system for user
accounts.
He is worried that a user’s login details may be gathered by malware when they are logging
into their account.
(i) State the type of malware that could be used to gather a user’s login details.
..................................................................................................................................... [1]
(ii) Give three methods that could be used to help prevent a user’s login details being
gathered by malware, when they are logging into their account.
Method 1 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Method 2 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Method 3 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[6]
(e) The paragraph describes how the web pages are obtained and displayed for the user.
Complete the paragraph using the list of terms. Not all terms in the list need to be used.
• browser
• Hypertext Markup Language (HTML)
• Internet Protocol (IP) address
• Internet Service Provider (ISP)
• Media Access Control (MAC) address
• presentation
• protocols
• structure
• Uniform Resource Locator (URL)
• web pages
• web server
.......................................................................................... .
[6]
Tick (✓) to show which statements apply to each logic gate. Some statements may apply to
more than one logic gate.
NAND OR XOR
Statement
(✓) (✓) (✓)
if both inputs are the same as each other, the output is always 0
[4]
(b) NAND, OR, XOR, NOR and NOT are all examples of logic gates.
State the name of one other logic gate and complete its truth table.
A B Output
0 0
0 1
1 0
1 1
[2]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at [Link] after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2022 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
The words in bold in the mark scheme are important text that needs to be present, or some notion of it needs to be present. It does not have to
be the exact word, but something close to the meaning.
A single forward slash means this is an alternative word. A double forward slash means that this is an alternative mark point.
Ellipsis (…) on the end of one-mark point and the start of the next means that the candidate cannot get the second mark point without being
awarded the first one. If a mark point has an ellipsis at the beginning, but there is no ellipsis on the mark point before it, then this is just a follow-on
sentence and can be awarded without the previous mark point.
• Keyboard
• Trackpad
• Trackball
• Microphone
• Keypad
• Sensor
• Button
• Barcode/QR scanner/reader
• Webcam/digital camera
• Speaker
• Headphones
• Cheap to manufacture/buy
• Can still be used whilst wearing gloves
• Waterproof // Can be used in bad weather
• Does not easily shatter
• Low power consumption
• (Can) support multitouch
• Capacitive
• Infrared
• Multitasking
• Multiprogramming
• Input and output control
• Running software
• Memory management
• Processor management
• File management
• Handling interrupts
• Providing security
• Managing user accounts
• Batch / real-time processing
1(f)(i) • 000001100100 3
• 000011101011
• 000100101101
1(f)(ii) • 22 3
• 119
• 857
1(f)(iii) One mark for two correct characters in the correct place, two marks for three 4
• 095
• AD1
it checks the air is dry enough in a garage that spray paints Moisture/humidity
cars
it is volatile ✓
4 One mark for the method, one mark for a corresponding description 4
• Create a back-up
• this means the data can be restored/recovered
• Add verification
• to get the user to confirm they want to delete the data
• Set access rights
• so that she cannot delete any files
• Byte 4
• Bit 5
6(d)(i) • Spyware 1
6(d)(ii) One mark for a correct method, one mark for a corresponding description 6
6(e) One mark for each correct term in the correct order 6
• URL
• IP address
• Web server
• Web pages
• HTML
• Browser
NAND OR XOR
Statement
(✓) (✓) (✓)
if both inputs are the same as each other, the output is always 0 ✓
7(b) One mark for a correct logic gate, one mark for a corresponding truth table 2
• AND
A B Output
0 0 0
0 1 0
1 0 0
1 1 1
Question 5
Question 6
(a) Few candidates were able to provide a technical description of how the video would be displayed.
The most common marks awarded were for shining a laser onto the QR code and the black and
white sections of code reflecting light differently.
(c) Most candidates were able to give that the file size would be reduced. Some candidates were able
to then state that this would reduce storage space or transmission time.
(d) Few candidates were able to provide a technical description of how the screen operates. The most
common mark awarded was for LEDs being behind the screen.
Question 7
Most candidates were able to identify at least four correct missing terms. The most common incorrect
answers were memory data register and data bus.
Question 8
(a) Many candidates were able to give one similarity. The most common one given was that they are
both unique addresses. Some candidates were able to give a second correct similarity.
(b) Few candidates were able to give a difference between the addresses. The most common correct
answer given was that a MAC address cannot normally be changed, but an IP address can
sometimes change.
Question 9
Most candidates were able to give at least one correct piece of information about each part of the process.
The most common mark awarded for parity is that odd or even parity is set. The most common mark
awarded for ARQ is that it uses acknowledgment and timeout. Few candidates were able to give a technical
description covering both sections in detail.
Question 10
(a) (i) Most candidates were able to give the meaning of HTTPS.
(ii) Most candidates identified that they could look for a locked padlock symbol.
(b) Many candidates were able to identify hacking and a virus. some also gave malware or a suitable
type of malware. Some candidates gave multiple, different types of malware. This was also
awarded.
© 2022
Cambridge Ordinary Level
2210 Computer Science November 2022
Principal Examiner Report for Teachers
COMPUTER SCIENCE
Paper 2210/22
Paper 2 Problem-solving and
Programming
Key messages
Candidates who had previously worked through the pre-release material (visitor car park) and who
completed the tasks by producing their own programming code were able to demonstrate appropriate
techniques for solving this problem.
Candidates who took care to ensure that they fully answered the questions that were asked, taking care to
ensure their responses matched the context of the questions, scored higher marks than those who gave
generic responses. Examples included: candidates who described how their program achieved certain tasks;
candidates who supplied detailed annotations to their program code; candidates who took care to name or
describe variables and arrays appropriately to match their purpose.
Candidates are advised to answer algorithm questions as stated in the question so that pseudocode
questions are answered using pseudocode, program code questions are answered using program code and
flowchart questions are answered using a flowchart.
Candidates are advised to make sure that any answers they provide are appropriate for the command word
used in the question, such that questions beginning with explain will require more detail than those beginning
with state. In addition, those questions beginning with explain usually require an explanation of how
something was done, rather than a simple description of what was done.
General comments
Candidates demonstrated a good overall understanding of the requirements of the paper with very few
questions left unanswered.
Candidates demonstrated a good understanding of how arrays could be used within the context of the given
pre-release task.
Candidates are reminded that they should avoid using spaces in constant, variable, and array names.
Section A
Question 1
(a) (i) Candidates who identified a relevant constant for Task 1 and stated its value achieved both marks.
Marks were lost if the constant name contained spaces or if the example stated would not work as
a constant and would be better as a variable or an array.
(ii) Candidates who identified an array that could be used for Task 1 and stated its use achieved both
marks. Marks were lost if the variable name contained spaces or if the stated use was too vague.
(b) Candidates who described how the input of the day number for Task 1 could be validated achieved
marks for this question. Correct responses included descriptions of specific validation checks to
check the range and/or the data type, the use of conditional statements to check the input, or the
© 2022
Cambridge Ordinary Level
2210 Computer Science November 2022
Principal Examiner Report for Teachers
use of loops to repeat the input if required. An example of code to support the response was also
required for full marks. Candidates who described how to validate other data entry, such as parking
space number, or whether accessible parking was required, did not achieve marks.
(c) The vast majority of candidates achieved some marks for this question, which required a section of
code to be written to solve part of Task 2. Candidates were allowed to write their responses using
pseudocode, program code or a flowchart. Candidates who wrote their responses using program
code generally performed better. The full range of marks was seen for this question, with
candidates mostly providing code that used some or all of the following: inputs of day number and
whether accessible parking was required, a conditional statement to check the input for type of
parking required, input and storage in arrays of visitor names and car license numbers, output to
show booking details or no spaces available.
(d) This question required an explanation of how the program from the pre-release material could be
changed to allow bookings to be made over a four-week period instead of the two-week period as
stated in the scenario. Candidates correctly identified a range of changes that would need to be
made, including input prompts for users, maximum constants for the number of parking spaces or
days, array sizes for data storage, validation checks, and loop termination values. Many good
responses were seen, but candidates who only gave a coded response did not receive any marks
because an explanation was required.
(e) This question required an explanation of how part of Task 3 was achieved, in this case, how the
program records and outputs the number of general and accessible parking spaces for the two-
week cycle of the given scenario. Candidates correctly identified the use of counters, which could
be counting variables for both of these values, that would need to be initialised at the start of the
cycle. Many candidates went on to explain how, using conditional statements, allocated parking
spaces were identified and the relevant counters incremented. Some candidates also explained the
output that would be derived to show these values. Many good answers were seen, with the full
range of marks awarded. However, candidates who only gave a coded response did not receive
any marks, because an explanation was required.
Section B
Question 2
Most candidates achieved at least one mark here, to demonstrate that they could identify correct descriptions
of a number of given programming concepts. Many candidates achieved high marks.
Question 3
Candidates were required to describe the use of verification on input of data and explain why it was
necessary. Candidates who noted that verification is used to make sure that the data entered does not
change from the original data, or similar achieved the mark. Candidates who named and described a method
of verification, such as double entry, achieved more marks. Marks were lost where explanations for why
verification was necessary stated that it was to make sure correct data was entered, or if the descriptions of
verification methods lacked sufficient detail. Some candidates incorrectly described validation techniques in
this question.
Question 4
Candidates were required to describe a type of test data used to test for a program accepting valid input
data. Candidates who described normal, extreme, or acceptable boundary data achieved the marks.
Candidates who described any type of abnormal data did not achieve the marks because this type of test
data is to test for data that is rejected.
Question 5
(a) The vast majority of candidates were able to identify and give corrections for at least one of the
errors in the pseudocode algorithm, with many candidates achieving high marks. The full range of
marks was seen for this question.
(b) A wide range of quality answers was seen, with some candidates suggesting good solutions to
allow the algorithm to run indefinitely until the user wanted it to stop. The full range of marks was
© 2022
Cambridge O Level
* 1 1 2 2 7 4 2 8 6 9 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (DE) 317588
© UCLES 2022 [Turn over
2
Tick (✓) to show whether each component is an example of input, output or storage.
actuator
register
sensor
mouse
[5]
Draw one line from each denary value to the correctly converted 8‑bit binary value.
11110101
72
01110010
11100101
245
00010101
00001111
15
01001000
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2022 2210/13/O/N/22
3
Give the hexadecimal value for the 16‑bit binary value 0000100110101110
...................................................................................................................................................
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
3 Jessica wants to store a large number of small thumbnail images on a USB flash memory drive.
Each thumbnail image is 16‑bit colour and is 100 pixels wide and 100 pixels high.
She has 5 MB of storage space available on her USB flash memory drive.
Calculate how many images she can store in the 5 MB of storage space. Show all your working.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
(a) The company needs to decide which touch screen technology to use.
State one type of touch screen technology that you recommend the company use.
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(b) The mobile phone uses Random Access Memory (RAM) and Read Only Memory (ROM).
RAM and ROM are both examples of the same type of storage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) The mobile phone has a USB port to allow a USB connection to a computer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) One benefit of a USB connection is that the cable can only be inserted into the port one
way, so an incorrect connection cannot be made.
Give three other benefits of using a USB connection to connect a mobile phone to a
computer.
Benefit 1 ............................................................................................................................
...........................................................................................................................................
Benefit 2 ............................................................................................................................
...........................................................................................................................................
Benefit 3 ............................................................................................................................
...........................................................................................................................................
[3]
(d) When a user is reading a text on the mobile phone, they may also get a telephone call on the
mobile phone. An interrupt signal is generated that results in an output to inform the user that
a person is calling them.
Describe how the interrupt signal is processed to inform the user that a person is calling
them.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.
B X
[6]
(b) Complete the truth table for the given logic statement.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
6 A museum has Quick Response (QR) codes that allow visitors to view videos for extra information
about items in the museum.
The visitor is given a portable device with a display screen, that they can use to read each QR
code.
(a) Describe how the QR code is read and processed to display the video for the visitor.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Tick (✓) to show whether the videos are MP3 files, MP4 files or MIDI files.
Tick (✓)
MP3 files
MP4 files
MIDI files
[1]
Give two benefits of using lossy compression to compress the video files.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
[2]
(d) The portable device has a Light‑Emitting Diode (LED) display screen to allow the visitor to
watch a video.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
7 The paragraph explains how an instruction is processed by the Central Processing Unit (CPU).
Complete the paragraph using the list of terms. Not all terms in the list need to be used.
• address bus
• Arithmetic Logic Unit (ALU)
• calculations
• data bus
• decoded
• execute
• fetched
• interrupt
• Memory Address Register (MAR)
• Memory Data Register (MDR)
• Program Counter (PC)
• protocol
• ROM
• stored
will then perform any .................................................................... and logic operations that are
8 A computer can have both a Media Access Control (MAC) address and an Internet Protocol (IP)
address.
Similarity 1 ................................................................................................................................
...................................................................................................................................................
Similarity 2 ................................................................................................................................
...................................................................................................................................................
[2]
Difference 1 ..............................................................................................................................
...................................................................................................................................................
Difference 2 ..............................................................................................................................
...................................................................................................................................................
[2]
9 A system uses parity checks and Automatic Repeat reQuests (ARQ) to detect and correct errors
in the transmission of data.
Describe how parity checks and ARQ operate together to detect and correct errors.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(ii) One way a user can check a website uses HTTPS is to check whether the
Uniform Resource Locator (URL) begins with HTTPS.
Give one other way a user can check if a website uses HTTPS.
...........................................................................................................................................
..................................................................................................................................... [1]
(b) There is a risk that people that use the Internet to access websites can have their stored data
maliciously damaged.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at [Link] after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2022 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
The words in bold in the mark scheme are important text that needs to be present, or some notion of it needs to be present. It does not have to
be the exact word, but something close to the meaning.
A single forward slash means this is an alternative word. A double forward slash means that this is an alternative mark point.
Ellipsis (…) on the end of one-mark point and the start of the next means that the candidate cannot get the second mark point without being
awarded the first one. If a mark point has an ellipsis at the beginning, but there is no ellipsis on the mark point before it, then this is just a follow-on
sentence and can be awarded without the previous mark point.
actuator ✓
register ✓
sensor ✓
mouse ✓
11110101
72 01110010
11100101
245
00010101
15 00001111
01001000
2(b) One mark for two correct characters, two marks for three correct characters, three marks for four correct characters, in the 3
correct place
• 09AE
• 262 // 250
• 100 100
• 10 000 * 16 then / 8 // 10 000 *2
• 20 000 / 1024 or 1000 = 19.5 kB // 20 kB
• 5 1024 = 5120 // 5 1000 = 5000
• 5120 / 19.5 // 5000 / 20
4(a) One mark for a type of touchscreen technology, three marks for benefits 4
• Resistive
• … cheap to manufacture/buy
• … more simple/easier technology to manufacture
• … less affected by weather // more waterproof
• … does not need bare finger // can be pressed with most things
• … screen less likely to shatter/break
• … lower power consumption
• … (can) support multitouch
• Capacitive
• … good visibility in sunlight
• … supports multitouch
• … more longevity
• … faster response times
• … requires less/no pressure
• … high quality image/screen
• … doesn’t need to be calibrated
• … if screen is shattered, it will still register touch
• Infrared
• … good visibility in sunlight
• … supports multitouch
• … does not need bare finger // can be pressed with most things
• … high quality image/screen
• … if screen is shattered, it will still register touch
• … does not need to be calibrated
• … requires less/no pressure
• … faster response times
4(b) One mark for the correct storage type and one mark for the explanation 2
• Primary storage
• Both directly accessed by the CPU
5(a) One mark for each correct logic gate with the correct inputs 6
A B C Working space X
0 0 0 1
0 0 1 0
0 1 0 1
0 1 1 1
1 0 0 0
1 0 1 1
1 1 0 0
1 1 1 0
6(b) • MP4 1
• Fetched
• MDR
• Data bus
• Decoded
• ALU
• Calculations
• Execute
e.g.
• A MAC address is assigned by the manufacturer, whereas an IP address is assigned by the network/router/ISP
• A MAC address is represented as hexadecimal, whereas an IP address can sometimes be represented as numeric
• A MAC address is normally static, whereas an IP address can be dynamic
• A MAC address has 6 groups of digits, whereas an IP address has 4/8 groups
• A MAC address is 6 bytes (48 bit), whereas an IP address is 4/16 bytes (32/128 bit)
• Hacking
• Virus
• Malware
Note: If three different types of correct malware are given, they can be awarded.
COMPUTER SCIENCE
Paper 2210/13
Paper 1 Theory
Key messages
Candidates continue to provide a high standard of answers to mathematical and logic-style questions.
Candidates also continue to provide a high standard of answers to questions that require knowledge recall. It
would be beneficial for candidates to take note of the context that is used in questions and apply this to their
answers. Candidates demonstrated limited ability in doing this.
General comments
Candidates should make sure that if they use any additional space to answer a question they clearly note
that they have done this in their answer and clearly label the additional space used with the question number
they have answered there.
Question 1
Most candidates got at least three components correct. The most common incorrect answers were actuator
and register marked as input.
Question 2
Question 3
Few candidates were able to calculate the correct number. Most candidates gained a mark for 100 × 100. It
was at this point many candidates then did not give a correct calculation. Some only multiplied by 16. Some
only divided by 8.
Question 4
(a) Most candidates were able to give the name of a type of touch screen. Many candidates were able
to give at least one benefit of the type of touch screen chosen. Few candidates were able to give
multiple benefits of the touch screen type chosen.
(b) Most candidates were able to identify that they are examples of primary storage. Few candidates
were able to explain why. Most gave an example of what would be stored in RAM or ROM.
(c) (i) Most candidates were able to state that serial transmission is used and that data is sent down a
single wire.
(ii) Many candidates were able to give at least two benefits of the connection. The most common
correct answers were that it can power the device and that it is a universal standard.
(d) Few candidates were able to give a technical description of how the message is displayed. The
most common mark awarded was for the interrupt signal being sent to the CPU.
© 2022
Cambridge Ordinary Level
2210 Computer Science November 2022
Principal Examiner Report for Teachers
Question 5
Question 6
(a) Few candidates were able to provide a technical description of how the video would be displayed.
The most common marks awarded were for shining a laser onto the QR code and the black and
white sections of code reflecting light differently.
(c) Most candidates were able to give that the file size would be reduced. Some candidates were able
to then state that this would reduce storage space or transmission time.
(d) Few candidates were able to provide a technical description of how the screen operates. The most
common mark awarded was for LEDs being behind the screen.
Question 7
Most candidates were able to identify at least four correct missing terms. The most common incorrect
answers were memory data register and data bus.
Question 8
(a) Many candidates were able to give one similarity. The most common one given was that they are
both unique addresses. Some candidates were able to give a second correct similarity.
(b) Few candidates were able to give a difference between the addresses. The most common correct
answer given was that a MAC address cannot normally be changed, but an IP address can
sometimes change.
Question 9
Most candidates were able to give at least one correct piece of information about each part of the process.
The most common mark awarded for parity is that odd or even parity is set. The most common mark
awarded for ARQ is that it uses acknowledgment and timeout. Few candidates were able to give a technical
description covering both sections in detail.
Question 10
(a) (i) Most candidates were able to give the meaning of HTTPS.
(ii) Most candidates identified that they could look for a locked padlock symbol.
(b) Many candidates were able to identify hacking and a virus. some also gave malware or a suitable
type of malware. Some candidates gave multiple, different types of malware. This was also
awarded.
© 2022
Cambridge Ordinary Level
2210 Computer Science November 2022
Principal Examiner Report for Teachers
COMPUTER SCIENCE
Paper 2210/22
Paper 2 Problem-solving and
Programming
Key messages
Candidates who had previously worked through the pre-release material (visitor car park) and who
completed the tasks by producing their own programming code were able to demonstrate appropriate
techniques for solving this problem.
Candidates who took care to ensure that they fully answered the questions that were asked, taking care to
ensure their responses matched the context of the questions, scored higher marks than those who gave
generic responses. Examples included: candidates who described how their program achieved certain tasks;
candidates who supplied detailed annotations to their program code; candidates who took care to name or
describe variables and arrays appropriately to match their purpose.
Candidates are advised to answer algorithm questions as stated in the question so that pseudocode
questions are answered using pseudocode, program code questions are answered using program code and
flowchart questions are answered using a flowchart.
Candidates are advised to make sure that any answers they provide are appropriate for the command word
used in the question, such that questions beginning with explain will require more detail than those beginning
with state. In addition, those questions beginning with explain usually require an explanation of how
something was done, rather than a simple description of what was done.
General comments
Candidates demonstrated a good overall understanding of the requirements of the paper with very few
questions left unanswered.
Candidates demonstrated a good understanding of how arrays could be used within the context of the given
pre-release task.
Candidates are reminded that they should avoid using spaces in constant, variable, and array names.
Section A
Question 1
(a) (i) Candidates who identified a relevant constant for Task 1 and stated its value achieved both marks.
Marks were lost if the constant name contained spaces or if the example stated would not work as
a constant and would be better as a variable or an array.
(ii) Candidates who identified an array that could be used for Task 1 and stated its use achieved both
marks. Marks were lost if the variable name contained spaces or if the stated use was too vague.
(b) Candidates who described how the input of the day number for Task 1 could be validated achieved
marks for this question. Correct responses included descriptions of specific validation checks to
check the range and/or the data type, the use of conditional statements to check the input, or the
© 2022
Cambridge Ordinary Level
2210 Computer Science November 2022
Principal Examiner Report for Teachers
use of loops to repeat the input if required. An example of code to support the response was also
required for full marks. Candidates who described how to validate other data entry, such as parking
space number, or whether accessible parking was required, did not achieve marks.
(c) The vast majority of candidates achieved some marks for this question, which required a section of
code to be written to solve part of Task 2. Candidates were allowed to write their responses using
pseudocode, program code or a flowchart. Candidates who wrote their responses using program
code generally performed better. The full range of marks was seen for this question, with
candidates mostly providing code that used some or all of the following: inputs of day number and
whether accessible parking was required, a conditional statement to check the input for type of
parking required, input and storage in arrays of visitor names and car license numbers, output to
show booking details or no spaces available.
(d) This question required an explanation of how the program from the pre-release material could be
changed to allow bookings to be made over a four-week period instead of the two-week period as
stated in the scenario. Candidates correctly identified a range of changes that would need to be
made, including input prompts for users, maximum constants for the number of parking spaces or
days, array sizes for data storage, validation checks, and loop termination values. Many good
responses were seen, but candidates who only gave a coded response did not receive any marks
because an explanation was required.
(e) This question required an explanation of how part of Task 3 was achieved, in this case, how the
program records and outputs the number of general and accessible parking spaces for the two-
week cycle of the given scenario. Candidates correctly identified the use of counters, which could
be counting variables for both of these values, that would need to be initialised at the start of the
cycle. Many candidates went on to explain how, using conditional statements, allocated parking
spaces were identified and the relevant counters incremented. Some candidates also explained the
output that would be derived to show these values. Many good answers were seen, with the full
range of marks awarded. However, candidates who only gave a coded response did not receive
any marks, because an explanation was required.
Section B
Question 2
Most candidates achieved at least one mark here, to demonstrate that they could identify correct descriptions
of a number of given programming concepts. Many candidates achieved high marks.
Question 3
Candidates were required to describe the use of verification on input of data and explain why it was
necessary. Candidates who noted that verification is used to make sure that the data entered does not
change from the original data, or similar achieved the mark. Candidates who named and described a method
of verification, such as double entry, achieved more marks. Marks were lost where explanations for why
verification was necessary stated that it was to make sure correct data was entered, or if the descriptions of
verification methods lacked sufficient detail. Some candidates incorrectly described validation techniques in
this question.
Question 4
Candidates were required to describe a type of test data used to test for a program accepting valid input
data. Candidates who described normal, extreme, or acceptable boundary data achieved the marks.
Candidates who described any type of abnormal data did not achieve the marks because this type of test
data is to test for data that is rejected.
Question 5
(a) The vast majority of candidates were able to identify and give corrections for at least one of the
errors in the pseudocode algorithm, with many candidates achieving high marks. The full range of
marks was seen for this question.
(b) A wide range of quality answers was seen, with some candidates suggesting good solutions to
allow the algorithm to run indefinitely until the user wanted it to stop. The full range of marks was
© 2022
Cambridge Ordinary Level
2210 Computer Science November 2022
Principal Examiner Report for Teachers
seen with many candidates achieving high marks. However, some candidates only rewrote the
original algorithm with their corrections from part 5(a) added, without including the required
additional functionality.
Question 6
The vast majority of candidates achieved some marks for this trace table question, with the full range of
marks seen. Some marks were lost by candidates not following the algorithm through to its conclusion,
therefore not including all the values in all of the columns that should have been there. Other marks were lost
in the OUTPUT column where additional punctuation was added to the output rather than only including what
would have been produced by the algorithm.
Question 7
(a) (i) The vast majority of candidates recognised that the SubjectCode and Exams fields were of the text
and number data types, respectively. Some candidates incorrectly gave some examples of data
from these fields or applied data types, such as string, which were not available in the question.
(ii) The majority of candidates recognised that the Candidates field could not be of the Boolean data
type because it contained more than two possible values.
(b) Most candidates achieved some marks for this question, with many candidates achieving full marks
for showing the output that the given query-by-example grid would provide. Some candidates,
however, gave a description of what the output would contain, or how the output would be
produced, neither of which answer the question. Other typical errors included candidates showing
output for all three fields in the grid when only the SubjectName and Candidates fields are
displayed, or gave outputs in the wrong order.
(c) The majority of candidates achieved at least one mark for their completed query-by-example grid,
with many achieving two or three marks. Some candidates lost marks because they had missed
out one of the required fields, they had not completed the Table row, the sort method was missing
or incorrect, or there was an error in the search criteria.
© 2022
Cambridge O Level
* 2 6 9 9 8 1 7 2 6 8 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (ST) 326830
© UCLES 2023 [Turn over
2
(a) Tick (3) one box to show which statement about the binary number system is correct.
A It is a base 1 system
B It is a base 2 system
C It is a base 10 system
D It is a base 16 system
[1]
50 ..............................................................................................................................................
102 ............................................................................................................................................
221 ............................................................................................................................................
[3]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Register:
[2]
00110011
+01100001
[3]
(e) Two binary numbers are added by a computer and an overflow error occurs.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
2 A student has a sound file that is too large to be stored on their external secondary storage device.
The student compresses the sound file to make the file size smaller.
The compression method used reduces the sample rate and the sample resolution of the sound
file.
(a) State what is meant by the sample rate and sample resolution.
...................................................................................................................................................
...................................................................................................................................................
[2]
(b) Identify which type of compression has been used to compress the sound file.
...................................................................................................................................................
............................................................................................................................................. [1]
(c) The student sends the sound file to a friend. The file is transmitted across a network that uses
packet switching.
(i) Identify two pieces of data that would be included in the header of each packet.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
hard disk drive (HDD) random access memory (RAM) read only memory (ROM)
[3]
(b) Tick (3) one box to show which statement about secondary storage is correct.
D It is volatile.
[1]
Some of the terms in the list will not be used. You should only use a term once.
the ........................................................................ .
[4]
5 A farm has an automated drinking system for its animals. The drinking system has a water bowl
that contains the water. When the water bowl is empty, it is automatically refilled.
............................................................................................................................................. [1]
(b) Describe how the sensor and the microprocessor are used to automatically refill the water
bowl.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(a) (i) Identify the component in the computer that is needed to access a network.
..................................................................................................................................... [1]
(ii) Identify the type of address that is allocated to the component by the manufacturer,
which is used to uniquely identify the device.
..................................................................................................................................... [1]
(b) A dynamic internet protocol (IP) address is allocated to the computer when it is connected to
the network.
(i) Identify the device on the network that can connect multiple devices and automatically
assign them an IP address.
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
7 A programmer uses a low‑level language to write a computer program for a vending machine.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Give two reasons why the programmer would choose to write the computer program in a
low‑level language instead of a high‑level language.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2023 2210/11/M/J/23 [Turn over
8
8 A manager at a company is concerned about a brute‑force attack on its employee user accounts.
(a) Describe how a brute‑force attack can be used to gain access to the employee user accounts.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) One possible aim for carrying out a brute‑force attack is to install malware onto the company
network.
(i) State two other aims for carrying out a brute‑force attack to gain access to the employee
user accounts.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(c) Give two security solutions that could be used to help prevent a brute‑force attack being
successful.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Give two advantages to company employees of using robots to manufacture large pieces of
furniture.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(c) Give one disadvantage to the company’s owners of using robots to manufacture large pieces
of furniture.
...................................................................................................................................................
............................................................................................................................................. [1]
10 A student uses the internet for their schoolwork to research what is meant by pharming.
...................................................................................................................................................
............................................................................................................................................. [1]
[4]
(c) The student uses a web browser to access data on the internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(e) A student visits a website that uses session cookies, instead of persistent cookies.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
BLANK PAGE
Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at [Link] after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2023 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond
the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
Note: No marks are awarded for using brand names of software packages or hardware.
1(a) B 1
00110010
01100110
11011101
1(c) One mark for full method of working e.g. conversion to binary then flipping and adding 1 2
One mark for correct answer
10110010
1 1 11
0 0 1 1 0 0 1 1
0 1 1 0 0 0 0 1
10 0 1 0100
3(b) C 1
6(b)(i) Router 1
e.g.
User types in
web address
User
Real
computer
website
malware
Fake
Request website
gets
User clicks link that redirected
downloads malware
to computer
COMPUTER SCIENCE
Paper 2210/11
Computer Systems
Key messages
It would be beneficial for candidates to show a greater use of technical terminology in their responses. It
would also be beneficial for candidates to note the key terms given in a question and structure their response
based upon these. Candidates should note that any context given in a question should be used in the
answer, and their answer should be applied to the given context.
General comments
Candidates and centres are reminded that written papers are scanned in and marked on computer screens
by Examiners. Consequently, if a candidate writes the answer to a question on an additional page, they must
indicate very clearly to the Examiner where their revised answer is to be found. Also, if answers have been
crossed out, the new answer must be written very clearly, so that Examiners can easily read the text and
award candidates the appropriate mark.
Question 1
(a) Most candidates ticked the correct box. The most common incorrect answer given was base 1
system. Candidates are reminded to only tick one box when a question gives this as an instruction.
If candidates tick more than one box, a mark cannot be awarded.
(b) Most candidates were able to provide the correct binary numbers. Binary conversions continue to
be a strong point for candidates.
(c) Many candidates were able to provide the correct binary numbers. It is beneficial for candidates to
show all their working. Some candidates only showed partial stages of their working. For example,
a candidate would seem to flip each of the values, but didn’t show that they then added 1, just gave
their final answer.
(d) Many candidates were able to provide the correctly add the binary numbers, using binary addition.
Some candidates didn’t show all their working. For example, they did not show the values they
carried from one column to the next. It would be beneficial for candidates to note that the question
requires them to demonstrate binary addition. Some candidates converted the values to denary,
added the values and converted the answer back to binary. Candidates should note that this is not
answering the question, as they do not demonstrate binary addition.
(e) Many candidates were able to recognise that an overflow error occurs when the value is larger than
255. Some candidates were also able to state that this means the value will require more than 8
bits to be stored.
Question 2
(a) Few candidates were able to state what is meant by the sample rate and resolution. Some
candidates tried to describe the sample resolution in relation to an image. It would be beneficial for
candidates to have a greater understanding of how sound is represented by a computer.
© 2023
Cambridge Ordinary Level
2210 Computer Science June 2023
Principal Examiner Report for Teachers
(b) Most candidates were able to provide the correct type of compression. Some candidates gave an
example of compression rather than a type of compression. For example, they gave MP3.
Candidates should provide a type of compression, when requested, and not an example of the
compression type.
(c) (i) Most candidates were able to give two items of data that would be included in the packet header.
The two most common answers were sender’s IP address and receiver’s IP address.
(ii) Few candidates were able to give a full description of how data is transmitted using packet
switching. The most common mark points awarded were stating that data is broken down into
packets, and each packet can take a different route. It would be beneficial for candidates to
understand more about the process of how candidates take a different path, and the reordering of
packets at the end of transmission.
Question 3
(a) Many candidates circled the correct storage devices. The most common incorrect answers were
RAM and ROM.
(b) Some candidates identified the correct option. The most common incorrect answer given was
volatile.
Question 4
Most candidates were able to correctly complete the first two missing terms. Few candidates were able to
correctly complete the second two missing terms. The most common incorrect answer given was bootloader.
Question 5
(a) Many candidates were able to provide a correct sensor. The most common correct answer was
level sensor. The most common unsuitable sensor given was infrared.
(b) Very few candidates were able to provide a detailed, technical and accurate response for this
question. Many candidates gave a generic description of a system that uses sensors and
microprocessors. It would be beneficial for candidates to understand how to analyse and describe
the operation of a specific system, using the context given in the question.
Question 6
(a) (i) Many candidates were able to provide the correct component. The most common incorrect answer
was router.
(ii) Most candidates were able to identify the correct type of address.
(b) (i) Many candidates were able to provide the correct device.
(ii) Many candidates were able to describe a dynamic IP address. Some candidates provided
responses that were more suitable for describing what an IPv4 or IPv6 address is. Candidates are
reminded to look at the key terminology in the questions and structure their answer based on this.
Question 7
(a) Many candidates were able to describe what is meant by a low-level language.
(b) Few candidates were able to give reasons why a programmer would use a low-level language.
Many gave answer based upon it making the program more secure from hackers. It would be
beneficial for candidates to have a greater understanding of the benefits of using a low-level
language.
© 2023
Cambridge Ordinary Level
2210 Computer Science June 2023
Principal Examiner Report for Teachers
Question 8
(a) Few candidates were able to provide an accurate description of how a brute-force attack is carried
out. The most common mark point awarded was trying to guess a password. It would be beneficial
for candidates to have a greater understanding of how a brute-force attack is carried out.
(b) (i) Many candidates were able to give suitable reasons why a brute-force attack might be carried out.
Some candidates repeated information given in the question, stating that it was done to gain
access to a person’s account. Candidates are reminded to note information given in the question
and provide information beyond this in their response. Simply repeating information in the question
will not gain marks.
(ii) Most candidates were able to provide three types of malware that could be installed.
(c) Most candidates were able to provide suitable security solutions. The most common incorrect
answer given was using anti-virus software.
Question 9
(a) Many candidates were able to give at least one other characteristic of a robot. The most common
correct answer given was in relation to electrical components.
(b) Few candidates were able to give advantages to the company employees. Many candidates gave
advantages that would be applicable to the company’s owners, but not the employee, such as
robots do not need to take breaks.
Question 10
(b) Few candidates were able to draw and annotate an accurate diagram of the process of pharming.
The most common mark point awarded was a redirection to a fake website. It would be beneficial
for candidates to understand the focus of their diagram should be providing a simple structure and
annotation about the process. Many candidates had spent time drawing elaborate artworks, that
gained them few marks.
(c) Some candidates were able to describe the purpose of a web browser. Some candidates gave
functions of a web browser, rather than its purpose.
(d) Most candidates were able to provide at least two functions of a web browser. The most common
correct functions given were bookmarks and user history.
(e) Many candidates were able to provide some understanding about session cookies and persistent
cookies. This was mainly about them being temporary and permanent. Few candidates could
provide any detail beyond this. It would be beneficial for candidates to have a greater
understanding of session cookies and persistent cookies.
© 2023
Cambridge O Level
* 5 2 3 8 6 6 2 0 3 8 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (KS) 326833
© UCLES 2023 [Turn over
2
10010011 ..................................................................................................................................
00001101 ..................................................................................................................................
[4]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
0 1 1 1 1 0 1 0
(i) Complete the binary register to show its contents after this logical right shift.
[1]
(ii) State one effect this logical shift has on the binary number.
...........................................................................................................................................
..................................................................................................................................... [1]
(c) Give two reasons why a programmer may use hexadecimal to represent binary numbers.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 When keys are pressed on a keyboard, the text is converted to binary to be processed by the
computer.
(a) Describe how the text is converted to binary to be processed by the computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Text that is input into a computer can be stored in a text file.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(iii) Give two reasons why the text file may have been compressed.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
The student needs to transmit the photographs to their computer. They could use serial data
transmission or parallel data transmission to transmit the photographs.
(a) (i) Describe how the photographs would be transmitted using serial data transmission.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Give two benefits of transmitting the photographs using serial data transmission.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(iii) State one benefit of the student using parallel data transmission instead of serial data
transmission.
...........................................................................................................................................
..................................................................................................................................... [1]
(b) The photographs are also transmitted across a network to cloud storage. A device on the
network forwards the data towards its correct destination.
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(iii) Give one disadvantage of storing the photographs in cloud storage instead of storing
them locally.
...........................................................................................................................................
..................................................................................................................................... [1]
© UCLES 2023 2210/12/M/J/23 [Turn over
6
(a) Tick (3) one box to show which statement is correct about writing computer programs in a
high‑level language.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(c) The programmer uses an integrated development environment (IDE) to create the computer
program.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
Some of the terms in the list will not be used. Some terms may be used more than once.
secondary storage.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
[6]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(c) Give two security solutions that can be used to help prevent a DDoS attack being successful.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(a) Tick (3) one box to show which device would assign the IPv4 address to the computer.
C Router
D Web server
[1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
10 A user has both system software and application software installed on their computer.
(a) Describe the difference between system software and application software.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) State which component in the computer would store both types of software when the power is
turned off.
............................................................................................................................................. [1]
BLANK PAGE
Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at [Link] after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2023 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond
the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
Note: No marks are awarded for using brand names of software packages or hardware.
2(a) One mark per each correct character in the correct order: 4
9
3
0
D
2(b)(i) 00001111 1
2(d) One mark for two correct characters, two marks for three correct characters in the correct order: 2
1
2
D
4(b)(i) Router 1
5(a) C 1
7(a) One mark for each part of the diagram (MAX six). 6
The diagram demonstrates:
Malware downloaded to several computers
… turning it into a bot/zombie
… creating a network of bots/zombies
Third party/hacker initiating the attack
Bots send requests to a web server at the same time
The web server fails due to the requests
Legitimate requests cannot reach the web server
BOT
Botnet Web
Requests
server
BOT BOT
Computer
8(a) C 1
COMPUTER SCIENCE
Paper 2210/12
Computer Systems
Key messages
It would be beneficial for candidates to show a greater use of technical terminology in their responses. It
would also be beneficial for candidates to note the key terms given in a question and structure their response
based upon these. Candidates should note that any context given in a question should be used in the
answer, and their answer should be applied to the given context.
General comments
Candidates and centres are reminded that written papers are scanned in and marked on computer screens
by Examiners. Consequently, if a candidate writes the answer to a question on an additional page, they must
indicate very clearly to the Examiner where their revised answer is to be found. Also, if answers have been
crossed out, the new answer must be written very clearly, so that Examiners can easily read the text and
award candidates the appropriate mark.
Question 1
Most candidates were able to provide three correct output devices. The most common incorrect answer
given was microphone. The most common correct answer missed was actuator.
Question 2
(a) Most candidates were able to convert the binary numbers to hexadecimal. If a value converts to 0,
candidates should note that they should still give this value in their response.
(b) (i) Many candidates were able to correctly complete the register.
(b) (ii) Many candidates were able to state the effect of this shift. Some candidates gave an answer that
did not provide enough detail, such as the value decreases.
(c) Most candidates were able to give two suitable reasons. Some candidates who gave an answer in
relation to being shorter representation, were too vague in their response. For example, they stated
it takes up less space, but did not refer to where this happens. The most common incorrect answer
given is that it saves storage space.
(d) Most candidates were able to convert the denary number to hexadecimal. Number conversions
continue to be strong point for candidate knowledge.
Question 3
(a) Few candidates were able to accurately describe how text is converted to binary. Some candidates
focussed on how a keyboard process key presses, rather than how text is converted to binary.
Centres are reminded that describing the operation of input devices is no longer part of this
syllabus. It would be beneficial for candidates to have a greater understanding of how text is
converted to binary using a character set.
(b) (i) Most candidates were able to recognise that the file size would be reduced.
© 2023
Cambridge Ordinary Level
2210 Computer Science June 2023
Principal Examiner Report for Teachers
(ii) Some candidates were able to provide an accurate description of how lossless compression would
compress the text file. Some candidates gave confused descriptions relating to images, rather than
text. Some candidates provided a description that was more reflective of lossy compression, and
often still relating to an image. It would be beneficial for candidates to have a greater understanding
of how lossless compression compresses a text file.
Question 4
(a) (i) Most candidates were able to accurately describe serial transmission. Data transmission methods
continue to be a strong point in candidates’ knowledge.
(ii) Most candidates were able to give two benefits of using serial transmission.
(b) (i) Many candidates were able to state the correct device. The most common incorrect answer was IP
address.
(ii) Most candidates were able to describe what is meant by cloud storage.
(iii) Few candidates were able to give a suitable disadvantage for storing the photos in cloud storage.
Many candidates stated the photos could be hacked. Candidates should understand the photos
could also be hacked when stored locally, so this is not a disadvantage of storing in the cloud over
storing locally. The most common correct answer given was not being able to access them if
internet connection is lost. It would be beneficial for candidates to have a greater understanding of
the disadvantages of cloud storage.
Question 5
(a) Some candidates were able to tick the correct box. The most common incorrect answer was the
program is harder to debug. It would be beneficial for candidates to have a greater understanding
of the benefits of using a high-level language. Candidates also often confuse the benefits of low-
level and high-level languages. It is possible they get this misconception because high-level
language has the word ‘high-level’, that they interpret as more difficult.
(b) (i) Few candidates were able to accurately and technically describe the operation of a compiler. The
most common mark point awarded was for stating an executable file is created. It would beneficial
for candidates to have a greater technical understanding of the operation of a compiler. Some
candidates described the benefits of a compiler, rather than the operation.
(ii) Some candidates were able to describe how a compiler reports errors. It would be beneficial for
candidates to have a greater understanding of this process.
(c) Many candidates were able to provide at least two other functions of an IDE.
Question 6
(a) Many candidates were able to correctly complete the missing terms.
(b) Many candidates were able to give at least two functions of a cookie.
Question 7
(a) Many candidates had a very good attempt at drawing this process. The most common marks
awarded were for creating bots and the bots sending requests to the webserver. It would be
beneficial for candidates to have a greater technical understanding of the process of a DDoS.
Some candidates had spent time drawing elaborate artworks, that gained them few marks.
Candidates should focus on providing simple diagrams that are well annotated.
(b) Many candidates were able to provide two aims of carrying out a DDoS attack.
© 2023
Cambridge Ordinary Level
2210 Computer Science June 2023
Principal Examiner Report for Teachers
(c) Many candidates were able to give at suitable security solutions for a DDoS.
Question 8
(b) Many candidates were able to provide characteristics of an IP address, but did not extend this to
giving specific characteristics of an IPv4 address. It would be beneficial for candidates to have a
greater understanding of the specific characteristics of an IPv4 address.
Question 9
(a) Some candidates were able to identify the other parts of an expert system. Candidates seemed to
either know this fully, or not at all.
(b) Very few candidates were able to accurately describe the role of the inference engine. It would be
beneficial for candidates to have a greater understanding of the role of the components in an
expert system.
Question 10
(a) Many candidates were able to give a suitable example of each type of software, but few were able
to describe the difference between the type of software. Candidates are reminded that they should
not use brand names when referring to examples of software.
© 2023
Cambridge O Level
* 4 1 9 1 6 7 3 2 2 9 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CE) 333546
© UCLES 2023 [Turn over
2
(a) Tick (3) one box to show which cyber security threat is not a type of malware.
A Phishing
B Ransomware
C Virus
D Worm
[1]
(b) Identify one other example of malware than those given in part 1(a).
............................................................................................................................................. [1]
(c) Identify the type of software that is used to find and remove malware from a computer.
............................................................................................................................................. [1]
1 1 1 0 0 0 1 1
(a) Give the denary number for the binary number stored in the register.
............................................................................................................................................. [1]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(b) Give the hexadecimal number for the binary number stored in the register.
............................................................................................................................................. [2]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(c) A logical left shift of two places is performed on the binary number stored in the register.
Complete the binary register to show its contents after this logical left shift.
[1]
(d) The negative denary number −99 needs to be stored in the register.
Complete the register to show the binary number that would be stored, using two’s
complement. Show all your working.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Register:
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
3 A user’s computer has a central processing unit (CPU) that has a clock speed of 2 GHz.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Explain the effect this change will have on the performance of the CPU.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) The CPU has a list of all the machine code commands it can process.
............................................................................................................................................. [1]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
freezer laptop
5 A band is recording their new song. They need to consider the sample rate and sample resolution
of their recording.
(a) Give one benefit of using a higher sample rate to record the song.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) Give one drawback of using a higher sample rate to record the song.
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(d) The band wants to compress the sound file, but they do not want any data to be permanently
removed.
............................................................................................................................................. [1]
Complete the table by identifying which data transmission methods are described.
[4]
7 A train station has a ticket inspector who checks each customer’s ticket before they are allowed to
get on the train.
The train station wants a system that will allow the tickets to be automatically checked.
(a) Identify two suitable input devices that can be used to automatically read the tickets.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) The train driver pushes a button to close the train door when all passengers have boarded
the train. The train door will only close when there are no passengers in the doorway.
The system to check there are no passengers in the doorway uses a sensor and a
microprocessor.
Explain how the sensor and the microprocessor are used to check whether the train door can
be closed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
8 (a) Draw and annotate a diagram that demonstrates the cyber security threat of data interception.
[4]
(b) Identify one security solution that will help keep data safe from data interception and state
why it will help keep the data safe.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
© UCLES 2023 2210/12/O/N/23
9
Term Description
.................................................. the collective name for all the web pages available
a small text file, stored by the web browser, that can store
..................................................
a user’s personal data
...........................................................................................
...........................................................................................
...........................................................................................
...........................................................................................
[6]
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) Explain one disadvantage to the company owner of using an automated system in
manufacturing.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Identify the process that uses a digital ledger to track the use of digital currency.
............................................................................................................................................. [1]
(i) Tick (3) one box to show which is an example of primary storage.
..................................................................................................................................... [1]
Some of the terms in the list will not be used. Some terms may be used more than once.
...................................................................... to the
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at [Link] after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2023 series for most
Cambridge IGCSE, Cambridge International A and AS Level components, and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Note: No marks are awarded for using brand names of software packages or hardware.
1(a) − A 1
1(c) − Anti-malware 1
2(a) − 227 1
2(b) One mark for each correct character in the correct order: 2
− E3
2(c) 1
1 0 0 0 1 1 0 0
2(d) One mark for suitable working method e.g. flip and add 1 2
One mark for correct answer
− 10011101
1
1 1 1 0 0 0 1 1
+ 0 1 0 0 1 1 0 0
1 0 0 1 0 1 1 1 1
5(d) − Lossless 1
8(a) The diagram demonstrates (One mark for each part of the diagram): 4
− Data is being sent from one device to another
− The data is being examined during transmission
− Packet sniffer is used
− Intercepted data is reported to a third-party during transmission …
− … and analysed for anything useful
− Connection hacked to spoof destination address
e.g.
8(b) − Encryption … 2
− … if the data is intercepted it will be meaningless (because they do not
have the decryption key)
9 6
Term Description
− Utility/maintenance/repair costs
− … increase in bills such as electricity // skilled employees will be required
to maintain the system // equipment will break/need updating
12(b) − Blockchain 1
13(a)(i) − C 1
13(b) One mark for each correct term in the correct order: 5
− Random access memory (RAM)
− Hard disk drive (HDD)
− Pages
− Random access memory (RAM)
− Virtual memory // Hard disk drive (HDD)
COMPUTER SCIENCE
Paper 2210/12
Computer Systems
Key messages
It would be beneficial for candidates to show a greater use of technical terminology in their responses. It
would also be beneficial for candidates to note the key terms given in a question and structure their response
based upon these. Candidates should note that any context given in a question should be used in the
answer, and their answer should be applied to the given context.
General comments
Candidates and centres are reminded that written papers are scanned in and marked on computer screens
by Examiners. Consequently, if a candidate writes the answer to a question on an additional page, they must
indicate very clearly to the Examiner where their revised answer is to be found. Also, if answers have been
crossed out, the new answer must be written very clearly, so that Examiners can easily read the text and
award candidates the appropriate mark.
Question 1
(b) Most candidates were able to give another type of malware. The most common incorrect answers
were anti-malware and anti-virus.
(c) Many candidates were able to give the correct type of software.
Question 2
(a) Most learners were able to give the correct denary value.
(b) Most learners were able to give the correct hexadecimal number.
(c) Many candidates were able to correctly complete the binary shift. The most common incorrect
answer was from candidates who performed the binary shift to the right and not the left.
(d) Some candidates were able to show suitable working and the correct answer. Some candidates
only demonstrated partial working. Candidates are reminded to include all the working they do in
their response.
(e) Some candidates were able to add the two binary values and clearly showed that there was an
overflow from the result. Some candidates had only shown that they had converted the values to
denary, added them and then converted the result to binary. Candidates are reminded that this is
not a valid method of working as the question requires binary addition to be used.
Question 3
(a) (i) Few candidates were able to accurately state what is meant by the clock speed. Many candidates
gave a describe description such as it is the speed at which the CPU runs.
(ii) Most candidates were able to state that it would increase the performance of the CPU. Few
candidates were able to expand upon why this would happen.
© 2023
Cambridge Ordinary Level
2210 Computer Science November 2023
Principal Examiner Report for Teachers
(b) Many candidates were able to state that the MAR stores addresses. Few candidates were able to
expand their description with further detail.
(c) Some candidates were able to identify the list of commands as an instruction set. Some candidates
gave the answer mnemonics. These are used in an instruction list but are not accurate for the
name of the list.
Question 4
(a) Most candidate could give at least one characteristic of an embedded system. The most common
correct answers were that it performs a specific function and it has a microprocessor.
(b) Many candidates were able to identify the three correct examples.
Question 5
(c) Few candidates were able to provide an accurate description sample resolution. The most common
incorrect answers describe sample rate instead of sample resolution.
(d) Most candidates were able to identify the correct compression method.
Question 6
Many candidates were able to give the correct transmission methods. Some candidates only gave part of the
transmission method used. For example, they gave serial data transmission instead of stating it was serial
simplex transmission.
Question 7
(a) Many candidates were able to provide at least one suitable input device. The most common correct
answer was barcode scanner. Some candidates were too vague in their answer just stating
scanner.
(b) Few candidates were able to provide an accurate and technical explanation of how the sensor and
microprocessor would be used. Many candidates gave a very generic response with little or no
reference to the context. Candidates are reminded to apply any context given in a question to their
answer.
Question 8
(a) Few candidates were able to provide an accurate diagram about the process of data interception.
Many candidates demonstrated the data being transmitted from one device to another. They also
demonstrated that a third party intercepted the data mid transmission. Very few candidates referred
to the data packets being examined by a packet sniffer.
(b) Some candidates demonstrated understanding that encryption could help keep the data safe. The
most common incorrect answer was firewall; however, a firewall cannot help keep the data safe
mid-transmission.
Question 9
Many candidates were able to complete the correct terms but few candidates were able to provide correct
descriptions.
© 2023
Cambridge Ordinary Level
2210 Computer Science November 2023
Principal Examiner Report for Teachers
Question 10
(a) Many candidates were able to give a characteristic of AI. The most common correct answer was
the ability to learn.
(a) Very few candidates were able to provide a fully accurate and technical description about how an
expert system operates. Some candidates were able to name some or all of the components
involved but very few could describe their role in the process. It would be beneficial for candidates
to have a greater understanding of how an expert system operates.
Question 11
(a) Many candidates were able to state what a flow sensor measures. Some responses lacked detail
stating it measures the flow, but no reference to the amount of flow or the flow of what kind of
material.
(b) Some candidates were able to provide a relevant advantage. Many candidates did not provide an
advantage in context of the question. They provided advantages such as they can work 24/7.
However this would not be an advantage the employee.
(c) Many candidates were able to provide a relevant disadvantage. Most referred to high setup or
maintenance costs.
Question 12
(a) Many students were able to give at least one feature of a digital currency. The most common
correct answer was that it is a decentralised system.
(b) Many candidates were able to identify the correct name for the process.
Question 13
(a) (i) Most candidates were able to identify the correct example.
(ii) Many candidates were able to give a correct characteristic. Some candidates stated that primary
storage is volatile. This answer was incomplete as primary storage is both volatile and non-volatile.
(b) Many candidates were able to select the correct missing terms.
© 2023
Cambridge O Level
* 6 9 9 9 9 8 9 1 7 1 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (SL) 333548
© UCLES 2023 [Turn over
2
(a) Give two examples of an input device that would be built into a mobile telephone.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Give one example of an output device that would be built into a mobile telephone.
............................................................................................................................................. [1]
(c) The data storage in the mobile telephone can be measured using different units of
measurement.
..................................................................................................................................... [1]
..................................................................................................................................... [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
2 Humans use a denary number system and computers use a binary number system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
14 ..............................................................................................................................................
59 ..............................................................................................................................................
234 ............................................................................................................................................
[3]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
9 ................................................................................................................................................
26 ..............................................................................................................................................
65 ..............................................................................................................................................
[3]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(d) Convert the positive denary number 123 to 8-bit binary using two’s complement.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(e) Add the binary values 00110011 and 01111000 using binary addition.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(a) Circle three components that are built into the CPU.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) The CPU has a component that regulates the number of fetch–decode–execute cycles the
CPU can perform in a second.
............................................................................................................................................. [1]
(d) The CPU has a component that carries out all calculations and logical operations.
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) The employee wants his payment details to be automatically filled in when he buys products
using the internet.
Identify the function of a web browser that could be used for this purpose.
............................................................................................................................................. [1]
(c) The employee wants to be able to quickly access websites that he regularly uses.
Identify the function of a web browser that could be used for this purpose.
............................................................................................................................................. [1]
(d) The web browser uses the secure socket layer (SSL) protocol to transmit personal data
securely over the internet.
State how the SSL protocol secures the data for transmission.
...................................................................................................................................................
............................................................................................................................................. [1]
(a) Give one reason an error may occur when data is transmitted.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) Some error detection methods use a calculated value to check for errors.
Tick (3) one box to show which error detection method does not use a calculated value to
check for errors.
A Check digit
B Checksum
C Echo check
D Parity check
[1]
(c) An automatic repeat request (ARQ) can be used to make sure that data is received free of
errors. It can use a positive or negative acknowledgement method to do this.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
(a) Tick (3) one box to show which is not a characteristic of cloud storage.
(b) Explain two advantages for the owners of the company of storing its data in cloud storage.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(c) Explain one disadvantage to employees of the company storing data in the cloud.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
7 A photographer takes an image with a digital camera. The photographer sets the resolution and
colour depth for the image.
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
............................................................................................................................................. [1]
(c) Give one benefit of increasing the colour depth of the image.
...................................................................................................................................................
............................................................................................................................................. [1]
(d) The photographer compresses the image using a method that permanently reduces the
colour depth and resolution of the image.
............................................................................................................................................. [1]
(e) One benefit for compressing the image is to reduce the storage space it uses.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
[4]
Complete the table by writing the type of secondary storage that applies to each statement.
Some types of secondary storage may apply to more than one statement.
(b) Explain two differences between primary storage and secondary storage.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(a) Complete the description about the operation of the expert system.
Use the terms from the list. Some of the terms in the list will not be used.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at [Link] after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2023 series for most
Cambridge IGCSE, Cambridge International A and AS Level components, and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Note: No marks are awarded for using brand names of software packages or hardware.
1(c)(i) − 8 1
1(c)(ii) − 1024 1
2(b) − (0000)1110 3
− (00)111011
− 11101010
2(c) − 9 3
− 1A
− 41
2(d) One mark for suitable working method e.g. conversion to binary 2
One mark for correct answer
− 01111011
−
Question Answer Marks
3(c) − Clock 1
5(b) − C 1
−
Question Answer Marks
6(a) − B 1
7(d) − Lossy 1
e.g.
− Primary storage stores the data that is currently in use/for booting the
system
− … whereas secondary storage stores user’s files/data/operating
system/application software
10(a) One mark for each correct term, in the correct order: 5
− Knowledge base
− Inference engine
− Rule base // knowledge base
− Knowledge base // rule base
− Interface
COMPUTER SCIENCE
Paper 2210/13
Computer Systems
Key messages
It would be beneficial for candidates to show a greater use of technical terminology in their responses. It
would also be beneficial for candidates to note the key terms given in a question and structure their response
based upon these. Candidates should note that any context given in a question should be used in the
answer, and their answer should be applied to the given context.
General comments
Candidates and centres are reminded that written papers are scanned in and marked on computer screens
by Examiners. Consequently, if a candidate writes the answer to a question on an additional page, they must
indicate very clearly to the Examiner where their revised answer is to be found. Also, if answers have been
crossed out, the new answer must be written very clearly, so that Examiners can easily read the text and
award candidates the appropriate mark.
Question 1
(a) Most candidates were able to give two suitable input devices. The most common correct answers
were touchscreen and microphone. The most common incorrect answer was speaker.
(b) Many candidates were able to give a correct output device. The most common correct answer was
speaker. Some candidates gave headphones as a response; however these were not relevant as
they are not built into the device. Some candidates gave printer as a response which was not
relevant to the context. Candidates are reminded to make sure they provided answers relevant to
the context given.
(c) (i) Most candidates were able to give the correct value.
(d) Few candidates were able to provide a detailed and accurate description of the purpose of an
operating system. Most candidate gave functions of an operating system but gave little detail
beyond this.
Question 2
(b) Most candidates were able to provide the correct converted values.
(c) Many candidates were able to provide the correct hexadecimal values.
(d) Some candidates were able to show suitable working and the correct answer. Some candidates
only demonstrated partial working. Candidates are reminded to include all the working they do in
their response.
(e) Some candidates were able to correctly add the two binary values. Some candidates had only
shown that they had converted the values to denary, added them and then converted the result to
binary. Candidates are reminded that this is not a valid method of working as the question requires
binary addition to be used.
© 2023
Cambridge Ordinary Level
2210 Computer Science November 2023
Principal Examiner Report for Teachers
Question 3
(a) Many candidates were able to circle the correct three components. The most common incorrect
answer was RAM.
(c) Some candidates were able to name the correct component. The most common incorrect answer
was the control unit.
Question 4
(a) Some candidates were able to explain the purpose of a web browser. Many candidates gave
features or functions of a web browser instead of explaining its purpose.
(d) Many candidates were able to identify that encryption would be used.
Question 5
(a) Many candidates were able to identify a correct reason for an error occurring. The most common
correct answer was interference.
(b) Most candidates were able to identify the correct error detection method.
(c) Some candidates were able to provide a detailed and technical explanation of how a positive ARQ
operates. Many candidates described both the positive and negative methods, often mixing them
together. Candidates are reminded to take note of the context given in the question and use this in
their response.
Question 6
(a) Many candidates were able to correctly identify which characteristic was not cloud storage.
(b) Some candidates were able to explain at least one advantages. The most common advantage
given was the ability to access the data from any location. It would be beneficial for candidates to
have further understanding of the advantages of cloud storage.
(c) Many candidates gave a suitable disadvantage. The most common correct answer was about an
internet connection being required.
Question 7
(a) Many candidates were able to state what is meant by image resolution.
(b) Some candidates were able to state what is meant by colour depth.
(c) Many candidates were able to give a correct benefit. The most common correct benefit was that
the image will have more detail.
(d) Most candidates were able to identify the correct compression method.
(e) Many candidates were able to give at least one benefit of compressing the image. The most
common correct answers referred to quicker transmission.
© 2023
Cambridge Ordinary Level
2210 Computer Science November 2023
Principal Examiner Report for Teachers
Question 8
Few candidates were able to draw and annotate an accurate diagram. The most common mark awarded was
for the router sending packets towards their correct destination.
Question 9
(a) Some candidates were able to give the correct types of secondary storage. The most common
correct answers were for optical storage.
(b) Some candidates were able to describe two differences. The most common incorrect difference
given is that primary storage in volatile and secondary storage is non-volatile.
Question 10
(a) Many candidates were able to select the correct missing terms.
(b) Very few candidates were able to give an accurate explanation of what is meant by machine
learning capabilities. It would be beneficial for candidates to have a greater understanding of
machine learning capabilities.
© 2023
Cambridge O Level
* 2 1 0 0 7 5 9 7 9 3 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (SL) 341463
© UCLES 2024 [Turn over
2
(a) Identify two input devices that could be built into the portable tablet computer.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Identify one output device that could be built into the portable tablet computer.
............................................................................................................................................. [1]
(c) Identify one type of storage device that could be built into the portable tablet computer.
............................................................................................................................................. [1]
(a) Tick (3) one box to show which statement about the hexadecimal number system is incorrect.
C It is a base 10 system.
20 ..............................................................................................................................................
32 ..............................................................................................................................................
165 ............................................................................................................................................
[3]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(a) Give the 8-bit binary number that will be stored after the shift has taken place.
............................................................................................................................................. [1]
(b) Tick (3) one box to show which statement about a logical left shift of two places is correct.
Convert the two’s complement integer 10100011 to denary. Show all your working.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
............................................................................................................................................. [1]
4 Data packets are transmitted across a network from one computer to another computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Packet switching is used to transmit the data packets across the network.
Identify the device that controls which path is taken by each data packet.
............................................................................................................................................. [1]
(c) Serial data transmission is used to transmit the data packets across the network.
Explain why serial data transmission is used to transmit the data packets.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
5 A computer uses both random access memory (RAM) and secondary storage.
...................................................................................................................................................
............................................................................................................................................. [1]
read only memory (ROM) secure digital (SD) card compact disk (CD)
Blu-ray disk universal serial bus (USB) drive solid-state drive (SSD)
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(d) The computer processes instructions using the fetch–decode–execute (FDE) cycle.
Draw and annotate a diagram to show the process of the fetch stage of the FDE cycle.
[4]
...................................................................................................................................................
............................................................................................................................................. [1]
............................................................................................................................................. [1]
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
Some of the terms in the list will not be used. You should only use a term once.
.............................................................. . [4]
BLANK PAGE
...................................................................................................................................................
............................................................................................................................................. [1]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(c) The robot plants seeds and stops when it reaches a fence. It then turns and continues planting
seeds. The robot uses sensors and a microprocessor to know when it reaches a fence.
Explain how the robot uses sensors and a microprocessor to know it has reached a fence.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(d) Give two advantages of the farmer using an automated robot to plant seeds.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(e) Give two disadvantages of the farmer using an automated robot to plant seeds.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
9 A company owner has installed a new network. Data is correct before it is transmitted across the
network.
The company owner is concerned that data might have errors after transmission.
(a) Explain how the data might have errors after transmission.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) The company owner decides to introduce an error detection system to check the data for
errors after transmission.
The error detection system uses an odd parity check and a positive automatic repeat query
(ARQ).
(i) Describe how the error detection system operates to check for errors.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [8]
© UCLES 2024 2210/11/M/J/24
11
(ii) Give two other error detection methods that could be used.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(c) The company owner also installs a firewall to help protect the network from hackers and
malware.
(i) Explain how the firewall operates to help protect the network.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
(ii) Give two examples of malware that the firewall can help protect the network from.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at [Link] after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2024 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptions for a question. Each question paper and mark scheme will also comply with these
marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond
the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
Note: No marks are awarded for using brand names of software packages or hardware.
2(a) C 1
2(b) 14 3
20
A5
3(a) 00011000 1
3(b) D 1
3(d) 1024 1
4(b) Router 1
Example:
PC sends address to
MAR then increments
If the number of 1s are odd/data meets odd parity an acknowledgement is sent to say the data is error free …
… the sender then sends the next packet of data …
… and the timer is restarted
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (JP) 341465
© UCLES 2024 [Turn over
2
(a) Give the name of the data storage measurement that is equal to 8 bits.
............................................................................................................................................. [1]
............................................................................................................................................. [1]
(c) Give the name of the data storage measurement that is equal to 1024 gibibytes (GiB).
............................................................................................................................................. [1]
(d) A 16-bit colour image has a resolution of 512 pixels wide by 512 pixels high.
Calculate the file size of the image in kibibytes (KiB). Show all your working.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(a) Tick (3) one box to show which of the terms is not a method for transmitting data.
A serial
B simplex
C parallel
D parity
[1]
(b) Data is broken down into smaller units to be transmitted from one device to another.
Give the name of the unit that data is broken down into.
............................................................................................................................................. [1]
(c) Data is often encrypted when it is transmitted from one device to another.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
...........................................................................................................................................
..................................................................................................................................... [1]
(a) Give the name of the number system that is base 16.
............................................................................................................................................. [1]
(b) Three denary numbers are entered into a computer. The computer converts the numbers and
stores them as binary.
(i) Give the binary number that would be stored for each of the denary numbers.
10 ......................................................................................................................................
50 ......................................................................................................................................
201 ....................................................................................................................................
[3]
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(c) The two binary integers 00110000 and 01100110 are added together.
Add the binary integers using binary addition and show your answer in binary. Show all your
working.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
4 A student uses both system software and application software on their computer.
............................................................................................................................................. [1]
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(c) Describe the difference between system software and application software.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(a) Complete the paragraph about fetching an instruction into the CPU to be processed.
Some of the terms in the list will not be used. You should only use a term once.
……………………………………………………… .
[7]
...................................................................................................................................................
............................................................................................................................................. [1]
Complete the table by giving the correct error detection method for each statement.
7 A computer has both a media access control (MAC) address and an internet protocol (IP) address.
(a) Tick (3) one box to show which of the statements is correct about the MAC address.
B It is assigned by a router.
..................................................................................................................................... [1]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
8 A company has a website that is suffering a distributed denial of service (DDoS) attack.
(a) Draw and annotate a diagram to show the process of the DDoS.
[5]
(b) Identify a solution that can be used to help prevent the DDoS attack being successful.
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
10 A garage uses an expert system to help diagnose any problems with cars that need repair.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) A car has a problem with its braking system, so it is brought into the garage.
Explain how the expert system operates and how it is used to help diagnose the problem.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
11 A company has a website. Users use the internet and the world wide web to access the website.
(a) Describe the difference between the internet and the world wide web.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) The website has a uniform resource locator (URL). The URL has three different parts.
Identify the three different parts that are included in the URL.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(c) One function of a web browser is to provide an address bar for a user to enter a URL.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at [Link] after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2024 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptions for a question. Each question paper and mark scheme will also comply with these
marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond
the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
Note: No marks are awarded for using brand names of software packages or hardware.
1(b) 8192 1
1(d) One mark for each correct stage of working (max 2): 3
512 512
262 144 * 2 // multiplied by 16 and divided by 8
524 288/1024
512 (KiB)
2(a) D 1
2(b) Packet 1
2(c)(i) Data is encrypted and decrypted using the same key (1 mark) 4
Any three from:
Plain text is encrypted into cipher text // cipher text is decrypted into plain text
Data is encrypted using an algorithm …
… that uses a key
The key can be generated using an algorithm
The key is transmitted to the receiver
3(a) Hexadecimal 1
3(b)(i) 1010 3
110010
11001001
1 1
0 0 1 1 0 0 0 0
0 1 1 0 0 1 1 0
1 0 0 1 0 1 1 0
Example:
Word processor
Spreadsheet
Database
Web browser
Image/photo-editor
Video-editor
Email client
Game
Social media app
5(a) One mark for each correct term in the correct place: 7
address
memory address register // MAR
random access memory // RAM
memory data register // MDR
data
current instruction register // CIR
control unit // CU
5(b) A list of (machine code) commands that can be processed by the CPU 1
7(a) A 1
7(b)(i) An IP address that has numerical values separated by dots that follows the format with a max value of 255 in any xxx 1
[Link]
Example: [Link]
8(a) One mark for each part of the diagram that shows: 5
A perpetrator/third party sending malware // user downloads/installs malware
Each computer is turned into a bot…
… to create a botnet
Third party initiates the attack
All the bots send a request at once to a web server
… crashing the webserver
Example:
Botnet
bot
bot
third web
party Requests server
bot
Third party
sends
Web server
malware.
bot cannot handle
all the requests
and crashes.
Malware turns
computers
into bots.
Solid-state stores data onto silicon chips/transistors using logic (floating/control/NAND/NOR) gates to control the
movement of electrons
… optical stores data by using lasers to burning pits and lands onto a disk
11(b) Protocol 3
Domain name
File name // web page name
, ,
Cambridge O Level
¬Wz> 4mHuOªE`y5W
¬¨2zToP4¦rw
¥eeu UUEE Eu 5uU
* 7 1 0 6 5 7 9 1 5 6 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (EV) 348274
© UCLES 2024 [Turn over
* 0000800000002 *
...................................................................................................................................................
............................................................................................................................................. [1]
(b) Utility software is one type of software that can be run on a computer.
Tick (3) one box to show which software is an example of utility software.
B anti-virus
C web browser
D database
[1]
(c) Identify the type of software that manages inputs and outputs for the computer.
............................................................................................................................................. [1]
............................................................................................................................................. [1]
Calculate the file size of the sound effect in kibibytes (KiB). Show all your working.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
3
, ,
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
..................................................................................................................................... [1]
3 A user enters data that is hexadecimal into a computer system. The data is converted to binary to
be processed by the computer.
...........................................................................................................................................
..................................................................................................................................... [1]
DO NOT WRITE IN THIS MARGIN
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
Give the binary number for each of the three denary numbers.
15 ..............................................................................................................................................
180 ............................................................................................................................................
235 ............................................................................................................................................
[3]
Working space
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Ĭ×ú¾Ġ´íÈõÏĪÅĊÝù·þ×
© UCLES 2024 ĬĨ³úÙğĀĩÒČăĚôĂĂÊÿĂ
ĥõÅÕõĕåÕõõÅÅÅÕąµÅÕ
2210/12/O/N/24 [Turn over
* 0000800000004 *
Give the hexadecimal number for each of the three denary numbers.
14 ..............................................................................................................................................
100 ............................................................................................................................................
250 ............................................................................................................................................
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(d) A binary integer that is stored in a register in the computer has a logical left shift performed on it.
(i) Describe the process of the logical left shift that is performed on the binary integer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
..................................................................................................................................... [1]
Give the name of the number system that can be used to represent negative binary integers.
............................................................................................................................................. [1]
DO NOT WRITE IN THIS MARGIN
ĬÕú¾Ġ´íÈõÏĪÅĊßû·Ā×
© UCLES 2024 ĬĨ³ûÙĥîĠåĆČđÒÞäÚ÷Ă
ĥÅĕÕµĕåõĕÕµÅąÕåµÕÕ
2210/12/O/N/24
* 0000800000005 *
DO NOT WRITE IN THIS MARGIN
5
, ,
Identify two input devices that can be built into the smartwatch.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
DO NOT WRITE IN THIS MARGIN
(b) Identify one output device that can be built into the smartwatch.
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
............................................................................................................................................. [2]
(d) The smartwatch uses a text message application that receives data from cloud storage.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
..................................................................................................................................... [2]
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
Ĭ×ú¾Ġ´íÈõÏĪÅĊßù·Ā×
© UCLES 2024 ĬĨ´üÑģòĐÔôõØĆÖøÚćĂ
ĥÅĥĕõõÅĕąåĥÅąµÅõÅÕ
2210/12/O/N/24 [Turn over
* 0000800000006 *
(e) The smartwatch only displays the time and text messages.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
5 A barcode scanning system uses a check digit to check for errors in data on input.
(a) Explain how the barcode scanning system operates to check for errors.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) After a barcode is scanned, data is sent to a stock control system to update the stock value
The data is sent to the stock control system using serial simplex data transmission.
(i) Explain how the data is sent using serial simplex data transmission.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
..................................................................................................................................... [3]
ĬÙú¾Ġ´íÈõÏĪÅĊÞù¶þ×
© UCLES 2024 ĬĨ³üÎĩĚĖÜ÷ĈÝĦÞĕò÷Ă
ĥĕÅĕõÕŵÅÅÅÅŵĥµĕÕ
2210/12/O/N/24
* 0000800000007 *
DO NOT WRITE IN THIS MARGIN
7
, ,
(ii) Explain why serial simplex is the most appropriate method of data transmission for this
purpose.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
..................................................................................................................................... [3]
(iii) The data is checked for errors after it has been transmitted to the stock control system.
Give two error detection methods that could be used for this purpose.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
DO NOT WRITE IN THIS MARGIN
6 The table contains names and descriptions of components in a central processing unit (CPU).
Complete the table by giving the missing component names and descriptions.
...............................................................................................
DO NOT WRITE IN THIS MARGIN
program counter
...............................................................................................
...............................................................................................
stores the address of the data that is about to be fetched
............................................................ from random access memory (RAM) into the CPU
...............................................................................................
accumulator
DO NOT WRITE IN THIS MARGIN
...............................................................................................
...............................................................................................
7 A student enters the uniform resource locator (URL) for a web page into their tablet computer.
...................................................................................................................................................
............................................................................................................................................. [1]
1 ................................................................................................................................................
(c) The student enters the URL into a piece of software that then displays the web page.
............................................................................................................................................. [1]
(d) Draw and annotate a diagram to show how the web page is located and retrieved to be
displayed on the student’s tablet computer.
[5]
ĬÙú¾Ġ´íÈõÏĪÅĊàù¶Ā×
© UCLES 2024 ĬĨ´úÖĥĨģÚÿòģĔúģĢïĂ
ĥåĥÕõµåõµĕĥÅąÕåõĕÕ
2210/12/O/N/24
* 0000800000009 *
DO NOT WRITE IN THIS MARGIN
9
, ,
(e) The data for the web page is transmitted using the secure socket layer (SSL) protocol.
Not all terms need to be used. Some terms may be used more than once.
(a) Tick (3) one box to show which sensor would be the most suitable for this purpose.
A proximity
B flow
DO NOT WRITE IN THIS MARGIN
C pressure
D level
[1]
(b) An expert system can be used to diagnose an error with a robot vacuum cleaner.
ĬÛú¾Ġ´íÈõÏĪÅĊàû¶Ā×
© UCLES 2024 ĬĨ³ùÎģĬēßùÿæÈĂ·ĢÿĂ
ĥåĕĕµÕÅĕåĥµÅąµÅµąÕ
2210/12/O/N/24 [Turn over
* 0000800000010 *
(c) Explain how the robot vacuum cleaner can make use of machine learning.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
ĬÙú¾Ġ´íÈõÏĪÅĊÝù¸þ×
© UCLES 2024 ĬĨ±úÏħĠõØĈùÉðüćÚćĂ
ĥõąĕõµąõĕåĥąąõåõåÕ
2210/12/O/N/24
DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN
© UCLES 2024
,
* 0000800000011 *
ĥõõÕµÕĥĕąÕµąąĕŵµÕ
ĬĨ²ù×ġĤąáòĈĀìĄÓÚ÷Ă
ĬÛú¾Ġ´íÈõÏĪÅĊÝû¸þ×
,
11
2210/12/O/N/24
BLANK PAGE
* 0000800000012 *
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at [Link] after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
ĬÙú¾Ġ´íÈõÏĪÅĊßù¸Ā×
© UCLES 2024 ĬĨ²ü×īĒĄÖðÿćĊàñÊÿĂ
ĥÅåÕõÕĥµĥõÅąÅĕĥµåÕ
2210/12/O/N/24
Cambridge O Level
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2024 series for most
Cambridge IGCSE, Cambridge International A and AS Level components, and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptions for a question. Each question paper and mark scheme will also comply with these
marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond
the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
1(b) B 1
−
Question Answer Marks
2(a) bit 1
2(b) 4 1
215 KiB
−
Question Answer Marks
3(b) • (0000)1111 3
• 10110100
• 11101011
3(c) • E 3
• 64
• FA
−
Question Answer Marks
• Touchscreen
• Microphone
• Button
• (Digital) camera
• Sensor // by example
• Screen
• Speaker
• LED
• Actuator
• A collection of servers
• Allows access to data remotely // Stores data in a remote location
• Hardware can be owned/managed by a third party
• Data storage that is stored/accessed using the internet
• Resources can be increased / decreased (on demand) // Can have unlimited storage capacity
• … no need to worry about running out of storage space
• … can save cost of purchase of hardware
−
Question Answer Marks
6 One mark for each correct term or definition in the correct place: 6
Components
• Control unit // CU
• Memory address register // MAR
• Data bus
• Current instruction register // CIR
Descriptions
• (Program counter) Stores the address of the next instruction to be fetched
• (Accumulator) Stores the interim result for a calculation
−
Question Answer Marks
• Protocol
• Domain name
• File name
For example:
Searches for
matching IP
address
IP address returned
Sent to next
Request Web pages DNS if URL
sent sent not found
DNS
Web server
7(e) One mark for each correct term in the correct order: 5
• Web browser
• Web server
• Web server
• Web browser
• Encrypted
−
Question Answer Marks
8(a) A 1
For example:
, ,
Cambridge O Level
¬Wz> 4mHuOªE_|5W
¬¨/rP¬j{pF5Yb
¥uU55 55Ue ¥U¥U
* 8 1 7 4 1 3 5 8 2 8 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (EV) 348273
© UCLES 2024 [Turn over
* 0000800000002 *
(a) Tick (✓) one box to show which of the following is the largest unit of data storage.
A tebibyte (TiB)
B pebibyte (PiB)
C mebibyte (MiB)
D gibibyte (GiB)
Example ....................................................................................................................................
Explanation ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
(i) Calculate the binary number for the denary number 175. Show all your working.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
DO NOT WRITE IN THIS MARGIN
ĬÕú¾Ġ´íÈõÏĪÅĊÞú·þ×
© UCLES 2024 ĬĨñÍĪĠöÑĆĊĠî¿ĩĚćĂ
ĥÅĥÕõÕÅÕąĕõÅąÕąĕÅÕ
2210/13/O/N/24
* 0000800000003 *
DO NOT WRITE IN THIS MARGIN
3
, ,
(ii) Give the binary number for the given hexadecimal numbers.
15 ......................................................................................................................................
2D ......................................................................................................................................
091 ....................................................................................................................................
[3]
Working space
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Add the two binary integers using binary addition. Show all your working. Give your answer
in binary.
DO NOT WRITE IN THIS MARGIN
11100011
+ 11001100
[4]
(e) Calculate the denary number for the two’s complement binary integer 10001110. Show all
your working.
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
DO NOT WRITE IN THIS MARGIN
Ĭ×ú¾Ġ´íÈõÏĪÅĊÞü·þ×
© UCLES 2024 ĬĨ®òÕĠĤĆèô÷éê·Ě÷Ă
ĥÅĕĕµµåµĕĥåÅąµĥÕÕÕ
2210/13/O/N/24 [Turn over
* 0000800000004 *
(a) State the effect the compression has on the report file.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) Give two benefits of compressing the report file before emailing it.
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(c) The employee decides to use lossless compression to compress the file.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
..................................................................................................................................... [1]
(ii) Give two advantages of the computer using Unicode instead of American standard code
for information interchange (ASCII).
1 ........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
ĬÕú¾Ġ´íÈõÏĪÅĊàú·Ā×
© UCLES 2024 ĬĨ®óÕĦĒăÓîðâČěďĊÿĂ
ĥõÅĕõµåĕõÅÕÅŵÅÕÅÕ
2210/13/O/N/24
* 0000800000005 *
DO NOT WRITE IN THIS MARGIN
5
, ,
(iii) Give one disadvantage of the computer using Unicode instead of ASCII.
...........................................................................................................................................
..................................................................................................................................... [1]
(i) Circle three items of data that can be found in the packet header.
(ii) Each packet is sent along a different path from the employee’s device to the employer’s
device.
Tick (✓) one box to show the name of this method of sending packets.
DO NOT WRITE IN THIS MARGIN
A packet networking
B packet circuiting
C packet switching
D packet transferring
[1]
(iii) A hardware device is used to control the path that each packet takes.
..................................................................................................................................... [1]
(f) The email data is checked for errors after it has been transmitted, using an echo check and a
checksum.
(i) Explain how the echo check is used to check for errors in the email data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
Ĭ×ú¾Ġ´íÈõÏĪÅĊàü·Ā×
© UCLES 2024 ĬĨôÍĤĎóæČāħÐģËĊïĂ
ĥõµÕµÕÅõĥµąÅÅÕåĕÕÕ
2210/13/O/N/24 [Turn over
* 0000800000006 *
(ii) In the checksum error detection method, two values are compared after transmission. If
the values do not match, an error is detected.
Explain why the values not matching would show an error has occurred.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(g) The email data is encrypted using asymmetric encryption before it is sent.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Give one similarity between symmetric encryption and asymmetric encryption.
..................................................................................................................................... [1]
(iii) Give two differences between symmetric encryption and asymmetric encryption.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
ĬÙú¾Ġ´íÈõÏĪÅĊÝü¶þ×
© UCLES 2024 ĬĨ®ôÒĪöùÞÿôϰěêâÿĂ
ĥåĕÕµõÅÕåÕåÅąÕąÕąÕ
2210/13/O/N/24
* 0000800000007 *
DO NOT WRITE IN THIS MARGIN
7
, ,
3 An instruction is fetched from random access memory (RAM) into the memory data register (MDR)
to be decoded.
(a) Identify two other registers that are used in the fetch stage of the cycle.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Complete and annotate the diagram to show how the data is decoded once it has been
DO NOT WRITE IN THIS MARGIN
MDR
DO NOT WRITE IN THIS MARGIN
[4]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
ĬÛú¾Ġ´íÈõÏĪÅĊÝú¶þ×
© UCLES 2024 ĬĨóÚĠúĉÛùýÛĬģîâïĂ
ĥåĥĕõĕåµµåõÅąµĥĕĕÕ
2210/13/O/N/24 [Turn over
* 0000800000008 *
4 Complete the table to give the missing term or description for the internet terms.
...........................................................................................
web browser
...........................................................................................
...........................................................................................
...........................................................................................
[6]
DO NOT WRITE IN THIS MARGIN
ĬÙú¾Ġ´íÈõÏĪÅĊßü¶Ā×
© UCLES 2024 ĬĨòÚĦČĀà÷ĆÔʿвćĂ
ĥĕµĕµĕåĕÕąąÅŵÅĕąÕ
2210/13/O/N/24
* 0000800000009 *
DO NOT WRITE IN THIS MARGIN
9
, ,
5 A farmer has a plough that is an automated system. The plough is used to dig the ground in a field
to prepare it for planting seeds.
The plough uses sensors and a microprocessor to maintain a straight line when digging the
ground.
...................................................................................................................................................
............................................................................................................................................. [1]
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
............................................................................................................................................. [3]
(c) Give two benefits to the farmer of using an automated system for this purpose.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
DO NOT WRITE IN THIS MARGIN
(d) The plough uses artificial intelligence (AI) to navigate its way around the field.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
ĬÛú¾Ġ´íÈõÏĪÅĊßú¶Ā×
© UCLES 2024 ĬĨ®ñÒĤĈðÙāûĕĎ·Č²÷Ă
ĥĕÅÕõõÅõÅõÕÅÅÕåÕĕÕ
2210/13/O/N/24 [Turn over
* 0000800000010 *
Not all terms need to be used. Some terms may be used more than once.
that are stored on a user’s secondary storage device until they are manually deleted or they
....................................................... .
[7]
1 ................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
DO NOT WRITE IN THIS MARGIN
ĬÙú¾Ġ´íÈõÏĪÅĊÞü¸þ×
© UCLES 2024 ĬĨ°òÓĨĄĚâðýúæ½¼ĊïĂ
ĥÅÕÕµĕąĕõµąąÅĕÅĕµÕ
2210/13/O/N/24
* 0000800000011 *
DO NOT WRITE IN THIS MARGIN
11
, ,
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
ĬÛú¾Ġ´íÈõÏĪÅĊÞú¸þ×
© UCLES 2024 ĬĨ¯ñÛĢĀĪ×Ċô¯òµĠĊÿĂ
ĥÅåĕõõĥõĥÅÕąÅõåÕåÕ
2210/13/O/N/24
* 0000800000012 *
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at [Link] after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
ĬÙú¾Ġ´íÈõÏĪÅĊàü¸Ā×
© UCLES 2024 ĬĨ¯ôÛĬîğäĈû¸Ôę¾Ě÷Ă
ĥõõĕµõĥÕąĥåąąõąÕµÕ
2210/13/O/N/24
Cambridge O Level
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2024 series for most
Cambridge IGCSE, Cambridge International A and AS Level components, and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level
descriptions for a question. Each question paper and mark scheme will also comply with these
marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Note: No marks are awarded for using brand names of software packages or hardware.
1(a) B 1
1(b) One mark for correct example. Two marks for matching explanation. 3
• RAM
• To store data/instruction that is currently in use
• To store software/programs that are currently in use
• For volatile storage // to store data temporarily
• To allow data to be accessed directly by the CPU/processor // To allow data
to be stored closer to the CPU/processor
• ROM
• To store the BIOS
• To store the bootstrap/bootloader
• To store start-up instructions
• To store the firmware
• For non-volatile storage // to store data permanently
• To store data/instructions that should not change (unless needed)
• Cache
• To store frequently used instructions/data
• For volatile storage // to store data temporarily
128 + 32 + 8 + 4 + 2 + 1
10101111
1
11100011
+ 11001100
1 1010111 1
1(e) One mark for correct working, for example: flip and add 2
One mark for correct denary.
–114
2(e)(ii) C 1
2(e)(iii) Router 1
• To keep it secure
• The data is sensitive/confidential
• To make it meaningless
• Program counter // PC
• Memory address register // MAR
• Current instruction register // CIR
For example:
Decodes
Control unit instruction using
instruction set
MDR CIR
Instruction
sent using
data bus
4 One mark for each correct term or description in the correct place. 6
Term
• World wide web // WWW
• IP (address)
• Domain name server // DNS
• Proxy server
Description
• (Web browser) Software/application that allows users to view/access
web pages by rendering HTML
• (Hacking) Gaining unauthorised access to a computer/system
For example:
For example:
6(a) One mark for each correct term in the correct order: 7
• web browser
• session
• temporary
• web browser // session
• persistent
• permanent
• expire
For example:
• It is a piece of software
• … used to write/develop/edit code
• … used test/debug the code
• … with features such as auto-completion // any suitable example
• To translate the code to low level language/machine code