Cambridge IGCSE™: Information and Communication Technology 0417/11 May/June 2020
Cambridge IGCSE™: Information and Communication Technology 0417/11 May/June 2020
com
Cambridge IGCSE™
Published
Students did not sit exam papers in the June 2020 series due to the Covid-19 global pandemic.
This mark scheme is published to support teachers and students and should be read together with the
question paper. It shows the requirements of the exam. The answer column of the mark scheme shows the
proposed basis on which Examiners would award marks for this exam. Where appropriate, this column also
provides the most likely acceptable alternative responses expected from students. Examiners usually review
the mark scheme after they have seen student responses and update the mark scheme if appropriate. In the
June series, Examiners were unable to consider the acceptability of alternative responses, as there were no
student responses to consider.
Mark schemes should usually be read together with the Principal Examiner Report for Teachers. However,
because students did not sit exam papers, there is no Principal Examiner Report for Teachers for the June
2020 series.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the June 2020 series for most Cambridge
IGCSE™ and Cambridge International A & AS Level components, and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
2 2
CLI GUI
4(b) 2
abnormal normal
AB
C
B
AO
Gender – 1 mark
= F – 1 mark
AND –1 mark
= A* – 1 mark
use of wildcard – 1 mark
Blood_group – 1 mark
The age changes every year therefore it will need to be changed regularly ...
... Administration of the database becomes more time consuming.
The age of the donor can be easily and automatically calculated from their
date of birth ...
... improving accuracy.
Comparisons
Both use the internet
Both redirect the user to a fake website
Both can lead to fraud and identity theft
Both use websites that look legitimate
Personal data is compromised
Differences
With phishing emails are sent to the computer
In pharming malicious code is uploaded to the computer
In phishing clicking a link sends user to a fake website
In pharming the code redirects the user to a fake website without their
knowledge
The email in phishing appears to have come from a trusted source
Website in pharming appears to be genuine
In pharming spyware can be used to record key presses
Avoid clicking on any unknown texts with links/Avoid clicking links in texts
from people you do not know.
Do not reply to text messages that have asked you about any of your
personal finances/details.
Be on the lookout for messages that contain the number 5000 or any
number that is not a phone number as this is used by smishers.
If the text messages urge you for a quick reply then that is a clear sign of
smishing.
Never call back a phone number that was associated with the text from an
unknown source.
If the text message was sent at an unusual time, then that is another sign of
smishing.
6 4
LAN WAN WLAN
Advantages
All elements are together in one unit therefore takes up less space
They are portable
Can be used in more places than a desktop
Disadvantages
Easier to steal/lose
Limited battery life so more likely to run out of power
Pointing devices can be more difficult to use
In built webcams can be more difficult to use rather than a desktop
If one piece of hardware breaks it can be more difficult to replace
Desktops have a better heat dispersion rate
More likely to be damaged as they are portable.
Screen size may be smaller
Less powerful
Benefits
If personal data is kept confidential then identity theft is reduced
It helps prevent fraud
Reduces the chance of users suffering harm from criminals, as less data for
criminals to attempt to access
Protects sensitive data
… examples:
racial/ethnic/political/religious/membership of trade unions/health/criminal
activity
Protects the data being used for purposes other than what it was collected
for
Drawbacks
Difficult to enforce as users give information freely
Most users do not read the terms and conditions before agreeing to them,
therefore allowing data to be used
Data protection is local but networks are global so laws are difficult to
enforce
Younger people do not mind that data is passed on therefore the law could
not be enforced for all
9(a) 6
Device Input Output Both
Buzzer
Receipt printer
Electronic scales
If less than the re-order level then the item is automatically re-ordered – 1
mark
Advantages
Fingerprints are unique
More accurate data entry
Improved security
Your fingerprints are with you all the time/cannot be lost/ID cards can be lost
Student needs to be present at the reader
Magnetic cards can be affected by magnetic fields/smart phones
Very difficult to clone unlike cards
Disadvantages
Takes a longer time to collect all the fingerprints and store them rather than
producing ID cards
Equipment would be more expensive
Damage to the finger/reader will give false readings/no reading
Invasion of privacy
11 Four from: 4
Data should be fairly and lawfully processed
Data should only be processed for the stated purpose
Data should be adequate, relevant and not excessive/limited
Data should not be kept longer than necessary
Data should be processed in accordance with the data subject’s rights
Data should be kept secure
Data should not be transferred to another country unless they have
adequate protection.
Data should be processed in a transparent manner
Data should be collected for specified/explicit/legitimate purposes
Data should only be further processed for archive purposes which is
compatible with the initial purposes
Data kept for archiving should safeguard the rights and freedoms of
individuals
Explicit consent required for processing sensitive data
Parental consent required for processing personal data of children including
online services
Data subjects are allowed access to their personal data
12 Magnetic stripe 8
Benefits
The user needs to have the card present to use it
Data more difficult to copy as it uses a stripe
Increased security as signature is also needed
Drawbacks
The card could be stolen and the signature copied
Magnetic stripe can be affected by magnetic fields
Card can be damaged due to overuse
Contactless
Benefits
More secure as encryption is used to read the card
Card details can be stored on a smartphone which might have an extra layer
of security
Stops shoulder surfing
Only allows a small amount to be transacted
Drawbacks
Someone who steals the card can use it without a PIN
Can be cloned using electronic devices
No contact with the device so other devices may ‘read’ the card accidentally
Security risk as the card contains personal information
To achieve full marks all three methods must be discussed, the discussion
must also cover both the benefits and drawbacks.