Computer Science Paper 1 SL
Computer Science Paper 1 SL
All rights reserved. No part of this product may be reproduced in any form or by any
electronic or mechanical means, including information storage and retrieval systems,
without the prior written permission from the IB. Additionally, the license tied with this
product prohibits use of any selected files or extracts from this product. Use by third
parties, including but not limited to publishers, private teachers, tutoring or study services,
preparatory schools, vendors operating curriculum mapping services or teacher resource
digital platforms and app developers, whether fee-covered or not, is prohibited and is a
criminal offense.
More information on how to request written permission in the form of a license can be
obtained from https://ibo.org/become-an-ib-school/ib-publishing/licensing/applying-for-a-
license/.
Tous droits réservés. Aucune partie de ce produit ne peut être reproduite sous quelque
forme ni par quelque moyen que ce soit, électronique ou mécanique, y compris des
systèmes de stockage et de récupération d’informations, sans l’autorisation écrite
préalable de l’IB. De plus, la licence associée à ce produit interdit toute utilisation de tout
fichier ou extrait sélectionné dans ce produit. L’utilisation par des tiers, y compris, sans
toutefois s’y limiter, des éditeurs, des professeurs particuliers, des services de tutorat ou
d’aide aux études, des établissements de préparation à l’enseignement supérieur, des
fournisseurs de services de planification des programmes d’études, des gestionnaires de
plateformes pédagogiques en ligne, et des développeurs d’applications, moyennant
paiement ou non, est interdite et constitue une infraction pénale.
Pour plus d’informations sur la procédure à suivre pour obtenir une autorisation écrite
sous la forme d’une licence, rendez-vous à l’adresse https://ibo.org/become-an-ib-school/
ib-publishing/licensing/applying-for-a-license/.
Todos los derechos reservados. No se podrá reproducir ninguna parte de este producto
de ninguna forma ni por ningún medio electrónico o mecánico, incluidos los sistemas de
almacenamiento y recuperación de información, sin la previa autorización por escrito del
IB. Además, la licencia vinculada a este producto prohíbe el uso de todo archivo o
fragmento seleccionado de este producto. El uso por parte de terceros —lo que incluye,
a título enunciativo, editoriales, profesores particulares, servicios de apoyo académico o
ayuda para el estudio, colegios preparatorios, desarrolladores de aplicaciones y
entidades que presten servicios de planificación curricular u ofrezcan recursos para
docentes mediante plataformas digitales—, ya sea incluido en tasas o no, está prohibido
y constituye un delito.
En este enlace encontrará más información sobre cómo solicitar una autorización por
escrito en forma de licencia: https://ibo.org/become-an-ib-school/ib-publishing/licensing/
applying-for-a-license/.
Computer science
Standard level
Paper 1
27 October 2023
1 hour 30 minutes
Instructions to candidates
y Do not open this examination paper until instructed to do so.
y Section A: a
nswer all questions.
y Section B: a
nswer all questions.
y The maximum mark for this examination paper is [70 marks].
8823 – 7014
6 pages © International Baccalaureate Organization 2023
–2– 8823 – 7014
Blank page
–3– 8823 – 7014
Section A
1. State two compatibility issues that may occur when two information technology (IT)
systems are merged. [2]
3. Identify two usability problems that can occur in a voice recognition system. [2]
4. State three pieces of information that a data packet must contain. [3]
A or not B and C
7. Identify three functions of the control unit (CU) in the central processing unit (CPU). [3]
N = 1216
X = 0
loop while N > 0
X = X + N mod 10
N = N div 10
end loop
output(X)
Turn over
–4– 8823 – 7014
Section B
The patients’ medical records and payments, the doctor’s appointment calendar, and other
important data are stored in a database on the central computer.
(a) Outline one security measure that can be taken to prevent unauthorized access to the
patients’ data stored on the central computer. [2]
(ii) Describe one method that can be used to prevent data loss. [2]
A new vaccine has been distributed that would be of benefit to some of the doctor’s patients.
A large number of personalized letters need to be written to these patients, inviting them to
visit the doctor’s practice to be vaccinated.
When the doctor visits a patient in their home, she needs to be able to access the patient’s
medical records stored on the central computer in the practice.
(d) Outline two reasons for the use of a virtual private network (VPN) in this situation. [4]
A mobile data connection enables the doctor to access internet resources while visiting
patients in their homes. Sometimes the data transfer speeds are slow.
(e) Explain why the speed of data transmission across a mobile network can vary. [3]
–5– 8823 – 7014
11. A systems analyst has been employed to make proposals on how to improve the current
operation of a design company.
(a) (i) Identify one other method of obtaining information from the end-users. [1]
(ii) Outline one advantage of using the method identified in part (a)(i) in preference
to interviews. [2]
A software company has been employed to program and implement a new system proposed
by the systems analyst.
(c) Explain why software testing is important at all stages of implementation. [3]
(d) Explain one ethical problem associated with using images. [3]
Images are sometimes larger than the limit placed on email attachments. For example,
a 60 MB image file needs to be sent by email without losing quality, but a file larger than
10 MB cannot be uploaded as an attachment.
(e) (i) Describe how large image files can be sent by email. [3]
(ii) State one other hardware or software problem associated with the use of images. [1]
Turn over
–6– 8823 – 7014
12. There were 10 gymnasts who took part in a gymnastics competition. The names and the
scores for all competitors were sorted in alphabetical order and stored in two arrays,
NAMES and SCORES (see Figure 1).
Figure 1: Data held in the NAMES array and the SCORES array
NAMES SCORES
(a) State the name of the gymnast whose score is stored in SCORES[5].[1]
To qualify for the next round of competition, a competitor must have a score above the
average score.
(c) Construct an algorithm in pseudocode that will determine and output the number
of gymnasts whose scores are above the average score.
You may assume that the average score is stored in the variable AVERAGE.[4]