IGCSE-O Level 2020 To May June 2024
IGCSE-O Level 2020 To May June 2024
https://www.youtube.com/@sirmushtaq
https://sirmushtaq.com/
2020-2024
Past Papers & Mark Schemes
M.Mushtaq Hussain
WhatsApp 03125275281
1
Cambridge O Level
* 0 6 2 2 1 5 6 1 6 9 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CE/SW) 198767
© UCLES 2020 [Turn over
2
2
1 A Von Neumann model for a computer system has a central processing unit (CPU) that makes
use of registers.
Register 1 .................................................................................................................................
Register 2 .................................................................................................................................
Register 3 .................................................................................................................................
[3]
Stage 1 ..............................................................................................................................
Stage 2 ..............................................................................................................................
[2]
(ii) Identify the component of the CPU that is responsible for decoding instructions.
..................................................................................................................................... [1]
2 Both an interpreter and a compiler can be used when writing a program in a high-level language.
(a) Explain why a programmer would make use of both an interpreter and a compiler.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Give three reasons why a programmer would choose to write a program in a high-level
language, instead of a low-level language.
Reason 1 ..................................................................................................................................
...................................................................................................................................................
Reason 2 ..................................................................................................................................
...................................................................................................................................................
Reason 3 ..................................................................................................................................
...................................................................................................................................................
[3]
3 A company collects and stores data about its customers. The data is stored on a server in the
company’s office.
The data is encrypted using symmetric encryption before it is sent to the cloud storage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Give three other methods that can be used to secure the data in the office.
Method 1 ...................................................................................................................................
...................................................................................................................................................
Method 2 ...................................................................................................................................
...................................................................................................................................................
Method 3 ...................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2020 2210/12/M/J/20 [Turn over
4
4
4 (a) Identify the name and draw the single logic gate that can replace the given logic circuits.
(i)
A
X
B
[2]
(ii)
A
X
B
[2]
(b) Complete the truth table for the given logic statement:
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(b) Meena buys products for her business using the Internet.
The Transport Layer Security (TLS) protocol is used for transferring data when she buys
products.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
..................................................................................................................................... [1]
(iii) Identify another protocol that can be used to transfer data securely.
..................................................................................................................................... [1]
The browser uses a small file to store the details of the products she views. This allows the
website to display advertisements for other products she may like.
............................................................................................................................................. [1]
Tick (3) to show if the statement applies to Capacitive or Resistive touch screen technology.
Capacitive Resistive
Statement
(3) (3)
Cheaper to manufacture
[6]
7 (a) Give the denary value of each of the three 12-bit binary values.
(i) 000000001100
..................................................................................................................................... [1]
(ii) 000011000110
..................................................................................................................................... [1]
(iii) 010011000001
..................................................................................................................................... [1]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
000011101001
............................................................................................................................................. [3]
8 Leonard has a new laser printer to print letters for his business.
Leonard connects his printer to his computer using the USB port.
(a) Give three benefits of using the USB port to connect the printer to the computer.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
Benefit 3 ...................................................................................................................................
...................................................................................................................................................
[3]
(b) State two benefits and one drawback of Leonard using a laser printer, instead of an inkjet
printer, to print the letters.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
Drawback ..................................................................................................................................
...................................................................................................................................................
[3]
(i) Give two examples of when a printer would generate an interrupt signal.
Example 1 .........................................................................................................................
Example 2 .........................................................................................................................
[2]
Identify the software in the computer that will receive and manage all interrupt signals.
..................................................................................................................................... [1]
Tick (3) to show if the statement applies to hard disk drive (HDD) storage or
solid state drive (SSD) storage.
HDD SSD
Statement
(3) (3)
It is non-volatile storage
[6]
Example 1 .................................................................................................................................
Example 2 .................................................................................................................................
[2]
10 Uma is concerned about risks that she may encounter when using the Internet.
Two of the risks she is concerned about are phishing and pharming.
(a) Give one similarity and two differences between phishing and pharming.
Similarity ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Difference 1 ..............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Difference 2 ..............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
(b) Identify two other risks that Uma could encounter when using the Internet.
Risk 1 ........................................................................................................................................
Risk 2 ........................................................................................................................................
[2]
(i) Uma tells her friend that a firewall can only be software-based.
Correct
Incorrect
[1]
(ii) Describe how the firewall helps to keep Uma’s data secure.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
1(b)(i) − Fetch 2
− Execute
4(a)(i) − NAND 2
4(a)(ii) − NOR 2
4(b) 4
A B C Working space X
0 0 0 0
0 0 1 0
0 1 0 1
0 1 1 1
1 0 0 0
1 0 1 0
1 1 0 1
1 1 1 1
4 marks for 8 correct outputs
3 marks for 6 or 7 correct outputs
2 marks for 4 or 5 correct outputs
1 mark for 2 or 3 correct outputs
5(c) − Cookies 1
6 6
Capacitive Resistive
Statement
() ()
Cheaper to manufacture
7(a)(iii) − 1217 1
7(b) One mark per each correct hex value in correct order 3
− 0E9
9(a) 6
HDD SSD
Statement
() ()
It is non-volatile storage
10(b) − Virus 2
− Malware
10(c)(i) − Incorrect 1
Cambridge O Level
* 9 2 0 1 5 8 2 8 9 0 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Do not attempt Tasks 1, 2 and 3 in the copy of the pre-release material on page 2; these are for
information only.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 50.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (JP) 198772
© UCLES 2020 [Turn over
20
7
Section B
2 Most programming languages include basic data types. Ahmad is describing the basic data types
he has used.
A number with a fractional part that can be positive or negative and used in calculations
A whole number that can be positive, negative or zero and used in calculations
A sequence of characters
3 (a) An algorithm has been written in pseudocode to input the names and marks of 35 students.
The algorithm stores the names and marks in two arrays Name[ ] and Mark[ ]. The highest
mark awarded is found and the number of students with that mark is counted. Both of these
values are output.
←
←
01 HighestMark 100
←
02 HighestMarkStudents 0
03 FOR Count 1 TO 35
04 OUTPUT "Please enter student name"
05 INPUT Name[Count]
06 OUTPUT "Please enter student mark"
07 INPUT Mark[Counter]
08 IF Mark[Count] = HighestMark
←
09 THEN
10 HighestMarkStudents HighestMarkStudents – 1
11 ENDIF
12 IF Mark[Count] > HighestMark
←
13 THEN
←
14 Mark[Count] HighestMark
15 HighestMarkStudents 1
16 ENDIF
17 NEXT Count
18 OUTPUT "There are ", HighestMarkStudents," with the highest mark of ",
HighestMark
Give line numbers where the four errors are to be found in the pseudocode. Suggest a
correction for each error.
Correction .................................................................................................................................
...................................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
[4]
(b) Explain how you could extend the algorithm to also find the lowest mark awarded, count the
number of students with that mark, and output both these values.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
© UCLES 2020 2210/22/M/J/20 [Turn over
23
10
4 This flowchart inputs the points won and the points lost when playing a game. The difference
between the points won and lost is calculated and depending on the result the player can: move
up to the next level, stay at the same level, or move down to the previous level. The flowchart
finishes when the input for points won is –1.
START
INPUT
PointsWon, PointsLost
IS
Yes END
PointsWon = –1 ?
No
Difference
PointsWon - PointsLost
OUTPUT IS
Yes
"Well done Difference > =
move up" 1000 ?
No
OUTPUT Yes IS
"Sorry move Difference < 0 ?
down"
No
OUTPUT
"Keep on trying"
[3]
(b) The flowchart needs to be changed. When the difference is more than 5000 the output
message is ‘Fantastic leap up two levels’.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
5 Arrays are data structures used in programming. Explain what is meant by the terms dimension
and index in an array. Use examples of arrays in your explanations.
Dimension ........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Index ................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[3]
6 A database table, JUICE, is used to keep a record of cartons of fresh fruit juice available for sale.
(a) Identify a suitable field to use as the primary key. State a reason for your choice.
Field ..........................................................................................................................................
Reason ......................................................................................................................................
...................................................................................................................................................
[2]
(b) Complete the query-by-example grid to display only the stock level and size of all cartons
containing only apple juice.
Field:
Table:
Sort:
Show:
Criteria:
or:
[4]
2 Real 5
Integer
Char/String
String
Boolean
-1 6700
6(a) One mark for field and one mark for reason 2
Field Juice code
Reason only unique identifier
6(b) 4
Field: Fruit 1 Fruit 2 Size Stock level
Sort:
Show:
or:
Cambridge IGCSE™
* 1 8 6 8 6 1 8 8 1 5 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (LK) 186556/2
© UCLES 2020 [Turn over
31
2
1 Tina is creating a website for charity events. She uses HTML to create the website.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) She uses the hexadecimal colour code #43B7F0 as the background colour for her website.
..................................................................................................................................... [1]
(ii) The hexadecimal colour code #43B7F0 is stored in three 8-bit registers.
Give the 8-bit binary values for each part of the hexadecimal code.
43
B7
F0
[6]
(c) Tina uses a microphone to record a welcome message for her website.
..................................................................................................................................... [1]
(ii) She wants to compress the recording to make sure that the file is as small as possible
for the website.
Identify which type of compression she should use and describe how this would compress
the file for the website.
Description
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(iii) Give two benefits of compressing the file for the website.
Benefit 1 ............................................................................................................................
...........................................................................................................................................
Benefit 2 ............................................................................................................................
...........................................................................................................................................
[2]
(d) Tina will use the TLS protocol in her website when selling tickets to people for different charity
events. This makes sure that their personal data is transmitted securely.
(i) Identify the two layers that are present in the TLS protocol.
Layer 1 ..............................................................................................................................
Layer 2 ..............................................................................................................................
[2]
(ii) Explain how data is sent securely using the TLS protocol.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [6]
(i) Identify three security threats to her web server that Tina might be concerned about.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(ii) Tina installs a proxy server to help protect her website from security threats.
Describe how the proxy server will help protect the website.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
2 Four 7-bit binary values are transmitted from one computer to another. A parity bit was added
to each binary value creating 8-bit binary values. All the binary values have been transmitted
correctly.
(a) Tick (✓) to show whether an Even or an Odd parity check has been used for each binary
value.
Even Odd
8-bit binary value
(✓) (✓)
11111111
01100110
01111011
10000000
[4]
Describe how a checksum can be used to check that the data has been transmitted correctly.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
(a) (i) Identify three ways that the data could be accidentally damaged.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(ii) State what Alessandro could do to make sure that he can retrieve his data if it is
accidentally damaged.
..................................................................................................................................... [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Blu-ray CD DVD
Statement
(✓) (✓) (✓)
All logic gates must have a maximum of two inputs. Do not attempt to simplify the logic
statement.
B X
[4]
(b) Complete the truth table for the given logic statement.
A B C Working space X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
True False
Statement
(✓) (✓)
It is a front-lit display
[5]
(b) Tammy connects the computer to her home network. The computer has a MAC address and
an IP address.
Complete the paragraph using the list of terms given. Not all terms need to be used.
• compiled
• computer
• control
• dynamic
• identify
• packet
• principal
• protocol
• similar
• unique
…………………………………………… .
[5]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
1(b)(i) − Presentation 1
43 0 1 0 0 0 0 1 1
B7 1 0 1 1 0 1 1 1
F0 1 1 1 1 0 0 0 0
1(c)(i) − Input 1
NOTE: If lossless given, marks can be awarded for a correct description of lossless as follow through.
Even Odd
8-bit binary value
() ()
11111111
01100110
01111011
10000000
NOTE: Three different types of human error can be awarded e.g. accidental deletion, not saving data, incorrect shutdown
procedure
Blu-ray CD DVD
Statement
() () ()
4(a) One mark for each correct logic gate with correct input: 4
A B C Working space X
0 0 0 0
0 0 1 1
0 1 0 0
0 1 1 1
1 0 0 0
1 0 1 1
1 1 0 1
1 1 1 1
True False
Statement
() ()
It is a front-lit display
5(b) One mark for each correct term in the correct place: 5
− Control
− Unique
− Identify
− Protocol
− Dynamic
Cambridge IGCSE™
* 1 1 2 9 1 3 8 4 5 2 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Do not attempt Tasks 1, 2 and 3 in the copy of the pre-release material on page 2; these are for
information only.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 50.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (ST) 185711/3
© UCLES 2020 [Turn over
51
8
Section B
2 Tick (3) one box in each row to identify if the statement about subroutines is true or false.
true false
Statement
(3) (3)
A subroutine is called from within a program.
A subroutine must return a value to the code from which it was called.
[2]
Identify three different types of test data. For each type, give an example of the test data you
would use to test this algorithm and state a reason for your choice of test.
Reason .............................................................................................................................................
..........................................................................................................................................................
Reason .............................................................................................................................................
..........................................................................................................................................................
Reason .............................................................................................................................................
..........................................................................................................................................................
[6]
4 This pseudocode algorithm allows 5000 numbers to be entered and stored in an array called
Number.
Extend and re-write the algorithm using pseudocode to also count and output how many of the
numbers stored in the array are greater than 500, using the variable Higher. Only output Higher
once with an appropriate message.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
© UCLES 2020 0478/22/O/N/20 [Turn over
53
10
REPEAT
Flag 0
FOR Count 0 to 3
IF Num[Count] < Num[Count + 1]
THEN
Store Num[Count]
Num[Count] Num[Count + 1]
Num[Count + 1] Store
Flag 1
ENDIF
NEXT Count
UNTIL Flag = 0
(a) The contents of the array at the start of the algorithm are:
Complete the trace table for the algorithm using the data given in the array.
[5]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
© UCLES 2020 0478/22/O/N/20
54
11
Input/Output Decision
[2]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
7 The table AUDIOPARTS stores the part number, description, cost and quantity in stock of the
items sold by a music shop.
............................................................................................................................................. [1]
(b) Identify the field that is most suitable to be a primary key and give a reason for your choice.
Fieldname .................................................................................................................................
Reason .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(c) Complete the query-by-example grid to show the items where the quantity in stock is fewer
than 10. Show all the fields from the database table in descending order of cost.
Field:
Table:
Sort:
Show:
Criteria:
or:
[4]
© UCLES 2020 0478/22/O/N/20
0478/22 Cambridge IGCSE – Mark Scheme 56
October/November
PUBLISHED 2020
Section B
2 2
true false
Statement
() ()
3 One mark for each correct type of test and one mark for each correct 6
accompanying example of test data and reason (max six) e.g.
• Extreme data
• 5000
• to check it is accepted
• Normal data
• 300
• To check it is accepted
• Abnormal data
• 10000
• To check it is rejected
Higher ← 0
FOR Count ← 1 TO 5000
INPUT Number[Count]
IF Number[Count] > 500
THEN
Higher ← Higher + 1
ENDIF
NEXT Count
OUTPUT "There are ", Higher, " values that are greater than
500"
5(a) 5
Num Num Num Num Num
Flag Count Store
[0] [1] [2] [3] [4]
45 56 30 12 15
0 0 45
56
1 45
3 12
15
12
0 0
6 Input/Output Decision 2
7(a) 17 1
7(b) One mark for correct fieldname and one mark for correct reason 2
PartNum
7(c) 4
Field: PartNum Description Cost Quantity
Sort: Descending
Show:
Criteria: <10
or:
Cambridge IGCSE™
* 1 8 7 5 9 9 1 1 3 6 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (DH/SG) 202677/4
© UCLES 2021 [Turn over
61
2
(a) Complete the table to show the hexadecimal and 8-bit binary values of the given denary
values.
49
123
200
[6]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Benefit 1 ....................................................................................................................................
...................................................................................................................................................
Benefit 2 ....................................................................................................................................
...................................................................................................................................................
[2]
(c) Hexadecimal is used to represent Hypertext Markup Language (HTML) colour codes in
computer science.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
Tick (3) to show if the statement applies to magnetic, solid state or optical storage. Some
statements may apply to more than one type of storage.
..................................................................................................................................... [1]
..................................................................................................................................... [1]
(iii) Identify which type of storage would be the most suitable for use in a web server and
justify your choice.
Justification ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(c) Describe the operation of USB flash memory and how it stores data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Do not attempt to simplify the statement. All logic gates must have a maximum of two inputs.
B X
[6]
(b) Consider the completed truth table for the given logic statement.
2 0 0 1 1
3 0 1 0 1
4 0 1 1 0
5 1 0 0 1
6 1 0 1 0
7 1 1 0 1
8 1 1 1 1
There are four errors in the truth table in the output (X) column.
Row .......................
Row .......................
Row .......................
Row .......................
[4]
4 Three types of Internet security risk are virus, spyware and denial of service (DoS) attack.
Tick (3) to show whether the statement applies to virus, spyware or denial of service. Some
statements may apply to more than one Internet security risk.
Denial of
Statement Virus Spyware service
(3) (3) (3)
captures all data entered using a keyboard
is self-replicating
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(c) Some Internet security risks can maliciously damage data. Data can also be damaged
accidentally.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
5 A security light system is used by a factory. The light only comes on when it is dark and when
movement is detected. The light will stay on for 1 minute before switching off.
Sensors and a microprocessor are used to control the security light system.
(a) Identify two sensors that would be used in the security light system.
Sensor 1 ...................................................................................................................................
Sensor 2 ...................................................................................................................................
[2]
(b) Describe how the sensors and the microprocessor control the security light system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [8]
6 Cookies can be used to store a user’s personal data and online browsing habits.
(a) A cookie could be used to automatically enter a user’s payment details when the user makes
a purchase online.
Describe how cookies can be used to store and automatically enter a user’s payment details.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Explain why a user may be concerned about their personal data and online browsing habits
being stored in cookies.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
7 Jolene uses HTML to create a website. She separates the HTML into structure and presentation.
..................................................................................................................................... [1]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(b) Explain why Jolene separates the HTML into structure and presentation.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
8 A keyboard is a type of input device that can be used to enter data into a computer.
Complete the paragraph that describes one method of operation for a keyboard, using the most
appropriate terms from the given list. Not all terms in the list need to be used.
• Binary
• Breaks
• Calculated
• Character
• Circuit
• Current
• Information
• Network
• Press
• Processor
• Signal
• Switch
A keyboard has a key matrix underneath the keys. When a key is pressed, it presses a
............................................. map to find the ............................................. value for the key that
49 31 00110001
123 7B 01111011
200 C8 11001000
2(b)(iii) One for type of storage, two for matching justification from: 3
− Magnetic // HDD
− (Web server) is likely to receive many requests a day
− (Web server) will likely need to store a lot of data and magnetic is high
capacity
− Magnetic is cheaper to buy for storage per unit than solid state
− Magnetic is capable of more of read/write requests over time // has more
longevity // SSD has more limited number of read/write requests (before
it is no longer usable)
− No requirement for it to be portable, so moving parts does not matter
− Solid-state // SSD
− (Web server) is likely to receive many requests a day
− (Web server) will likely need to store a lot of data and solid-state is high
capacity
− Solid-state is more energy efficient
− Solid-state runs cooler so will not overheat
− Solid state has faster read/write speeds to handle volume of traffic
3(a) One mark for each correct logic gate with correct input. 6
is self-replicating
Cambridge IGCSE™
* 0 3 3 7 1 8 6 9 5 9 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Do not attempt Tasks 1, 2 and 3 in the copy of the pre-release material on page 2; these are for
information only.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 50.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (LK) 202758/1
© UCLES 2021 [Turn over
75
8
Section B
2 (a) Write an algorithm in pseudocode to input 500 positive whole numbers. Each number input
must be less than 1000. Find and output the largest number input, the smallest number input
and the range (difference between the largest number and smallest number).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(b) Describe how the algorithm could be changed to make testing less time-consuming.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
3 (a) Draw the most appropriate flowchart symbol for each pseudocode statement.
IF Number = 20
PRINT Number
Number ← Number + 1
[3]
(b) State the type of each pseudocode statement. For example, X ← X + Y is totalling.
IF Number = 20 ...................................................................................................................
• Each password must be 8 or more characters in length; the predefined function Length
returns the number of characters.
• Each password is entered twice, and the two entries must match.
• Either Accept or Reject is output.
• An input of 999 stops the process.
REPEAT
OUTPUT "Please enter password"
INPUT Password
IF Length(Password) >= 8
THEN
INPUT PasswordRepeat
IF Password <> PasswordRepeat
THEN
OUTPUT "Reject"
ELSE
OUTPUT "Accept"
ENDIF
ELSE
OUTPUT "Reject"
ENDIF
UNTIL Password = 999
(a) Complete the trace table for the algorithm using this input data:
Secret, Secret, VerySecret, VerySecret, Pa55word, Pa55word, 999, 888
[3]
(b) Explain how the algorithm could be extended to allow three attempts at inputting the matching
password. Any pseudocode statements used in your answer must be fully explained.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................ [4]
(a) Write a pseudocode routine that sets each element to zero. Use the most suitable loop
structure.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
...................................................................................................................................................
............................................................................................................................................. [1]
6 A database table, PLANT, is used to keep a record of plants sold by a nursery. The table has these
fields:
• NAME – name of plant
• FLOWER – whether the plant flowers (True) or not (False)
• POSITION – shade, partial shade or sun
• SIZE – small, medium or large
• PRICE – price in $
• NUMBERSOLD – how many sold
A query-by-example grid has been completed to display only the price, name and number sold of
small plants that do not flower.
Table: PLANT
Sort:
Show: 3 3 3
Criteria: = "shade"
or:
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Field:
Table:
Sort:
Show:
Criteria:
or:
[5]
Section B
2(b) One mark for action required and one mark for method used 2
3(a) 3
Pseudocode statement Flowchart symbol
IF Number = 20
PRINT Number
Number ← Number + 1
Secret Reject
Secret Reject
999 Reject
Sort:
Show:
or:
OR
Sort:
Show:
or:
Cambridge IGCSE™
* 9 3 8 8 8 6 9 5 2 8 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (KS/FC) 202713/4
© UCLES 2021 [Turn over
86
2
Tick (✓) one box to show whether denary is a base-2, base-10 or base-16 number system.
Tick
(✓)
Base-2
Base-10
Base-16
[1]
05 ......................................................
20 ......................................................
1A ......................................................
AB ......................................................
[4]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Tick (✓) one box to show the correct 8-bit binary value for each hexadecimal value.
Tick
(✓)
00011001
00100101
10100001
[1]
Tick
(✓)
00011011
10110001
00011010
[1]
(d) (i) Give one way that hexadecimal is used in website development.
..................................................................................................................................... [1]
..................................................................................................................................... [1]
2 A train company wants to install a self-service ticket machine system for its train stations. When
the customer has purchased their tickets, the machine will provide a paper ticket.
(a) One output device that is used in the ticket machine is a display screen.
Identify one other output device that is used in the ticket machine system.
............................................................................................................................................. [1]
(b) The train company does not want users to use a keyboard or a mouse to enter their data,
when buying a ticket. The company is worried that they may be stolen or get too dirty.
Identify one other input device that would be suitable for use in the ticket machine system, to
allow users to enter their data.
............................................................................................................................................. [1]
Tick (✓) to show if each statement applies to serial simplex, parallel simplex, parallel
half-duplex or serial duplex data transmission. Some statements may apply to more than one
data transmission method.
(b) A Universal Serial Bus (USB) connection can be used to transmit data from a mobile device
to a computer.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
Benefit 3 ...................................................................................................................................
...................................................................................................................................................
[3]
Complete the paragraph using the list of terms. Not all terms in the list need to be used.
• capacitive
• change
• circuit
• conductive
• coordinates
• grid
• heat
• infra-red
• insulating
• light
• manufacture
• pressure
• resistive
top layer of the screen and makes it connect with the bottom layer to complete a
............................................................................ .
5 Sammi works for a finance company and has a laptop that he uses for his work. He has confidential
data about his customers stored on his laptop.
(a) Sammi is concerned about his customers’ confidential data being viewed by other people in
his office.
Identify three other methods Sammi could use to prevent his customers’ confidential data
being viewed.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(b) Sammi creates videos for the finance company website that give customers advice about
their finances.
He uses lossy compression to reduce the file size of the videos for the website.
(i) Give three ways that lossy compression can reduce the file size of the videos.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(ii) Give one drawback of using lossy compression to reduce the file size of the videos.
...........................................................................................................................................
..................................................................................................................................... [1]
(c) Sammi could have used lossless compression to compress the videos for the website.
(i) Give one reason why he would use lossless compression, rather than lossy compression,
for the videos.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Give two disadvantages of Sammi using lossless compression, rather than lossy
compression, for the videos.
Disadvantage 1 .................................................................................................................
...........................................................................................................................................
Disadvantage 2 .................................................................................................................
...........................................................................................................................................
[2]
6 A programmer can use translators, such as an interpreter and a compiler, when developing a
computer program.
...................................................................................................................................................
............................................................................................................................................. [1]
Difference 1 ..............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Difference 2 ..............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
............................................................................................................................................. [1]
Tick (✓) to show if each statement applies to a 3D scanner, barcode reader or a Quick Response
(QR) code reader. Some statements may apply to more than one type of device.
3D Barcode QR code
Statement scanner reader reader
(✓) (✓) (✓)
uses position and alignment markers for orientation
when scanning
8 An electronic game has three square mats that are coloured red, green and blue.
The player will see a colour displayed on a screen and has 1 second to hit the mat that matches
the colour. If the player hits the correct mat, within 1 second, a counter is incremented. When a
player hits an incorrect mat, the game ends.
The game uses sensors and a microprocessor to determine if the player hits the correct mat within
1 second.
Explain how the game uses sensors and a microprocessor to count the number of times a player
hits a correct mat within 1 second.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [7]
An interrupt is generated to inform the Central Processing Unit (CPU) that the application has
been opened.
(a) Give three other examples of when an interrupt signal could be generated.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(b) State what would happen if interrupt signals were not used in a computer.
...................................................................................................................................................
............................................................................................................................................. [1]
10 Jermain uses the Secure Socket Layer (SSL) protocol for secure transmission when sending data
using the internet.
(a) Explain how the SSL protocol secures the data for transmission.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Identify an alternative protocol that could be used for secure transmission of data using the
internet.
............................................................................................................................................. [1]
(c) Give two ways that a user can identify if a website uses secure data transmission.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2021 0478/12/O/N/21 [Turn over
94
10
Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.
B X
[5]
(b) Complete the truth table for the given logic statement.
A B C Working space X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(c) Identify two logic gates that are not included in the given logic statement.
1(a) − Base-10 1
1(b) − 5 4
− 32
− 26
− 171
1(c)(i) − 00100101 1
1(c)(ii) − 00011011 1
6(c) − Assembler 1
can often be built into an Electronic Point Of Sale (EPOS) terminal, for ()
example, a supermarket checkout
8 Seven from: 7
− Timer is started
− Pressure sensor (within each mat)
− Sensor sends data to microprocessor
− Analogue data is converted to digital (using ADC)
− Microprocessor compares data to stored value(s)
− If data matches / in/out range microprocessor stops timer
− If data matches / in/out range microprocessor checks if data has come from correct colour mat sensor
− If data matches / in/out range microprocessor checks to see if timer is stopped at less than 1 second
− If data matches / in/out range microprocessor increments counter if timer is less than 1 second and colour/mat is
correct
− If correct colour/mat is hit, timer is reset and the whole process is repeated
− If data has not come from the correct colour mat sensor the game ends
NOTE: If three suitable different errors are described, this can be awarded three marks.
10(a) − Enables an encrypted link (between the browser and the web server) // It encrypts the data 2
− … based on the authentication of an (SSL) certificate // and will only send it if the certificate is authentic
11(a) One mark per each correct logic gate with correct input(s) 5
B X
A B C Working space X
0 0 0 1
0 0 1 1
0 1 0 1
0 1 1 1
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 0
11(c) − NOR 2
− XOR / EOR
Cambridge IGCSE™
* 8 1 3 0 5 0 5 1 1 4 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Do not attempt Tasks 1, 2 and 3 in the copy of the pre-release material on page 2; these are for
information only.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 50.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (LK/FC) 202711/3
© UCLES 2021 [Turn over
106
7
Section B
2 Tick (3) one box in each row to identify if the statement is about validation, verification or neither.
[3]
3 A program checks that the data entered is between 1 and 100 inclusive.
Identify one piece of normal, extreme and erroneous test data for this program, and give a reason
for each.
Reason .............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Reason .............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Reason .............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[6]
4 The pseudocode algorithm should work as a calculator and output the result.
1 Continue 1
2 WHILE Continue = 0
3 OUTPUT "Enter 1 for +, 2 for -, 3 for * or 4 for /"
4 INPUT Operator
5 OUTPUT "Enter the first value"
6 INPUT Value1
7 OUTPUT "Enter the second value"
8 OUTPUT Value2
9 IF Operator
10 1: Answer Value1 + Value2
11 2: Answer Value1 - Value2
12 3: Answer Value1 * Value2
13 4: Answer Value1 / Value2
14 ENDCASE
15 OUTPUT "The answer is ", Value1
16 OUTPUT "Do you wish to enter more values (Yes or No)?"
17 INPUT MoreValues
18 IF MoreValues = "No"
19 THEN
20 Continue 1
21 ENDIF
22 UNTIL Continue = 0
(a) Find the five errors in the pseudocode and suggest a correction for each error.
Error 1 .......................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
Error 2 .......................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
Error 3 .......................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
Error 4 .......................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
Error 5 .......................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
[5]
© UCLES 2021 0478/22/O/N/21
108
9
(b) The algorithm needs changing to allow only the numbers 1, 2, 3, or 4 to be entered for the
input variable Operator.
Write the pseudocode to perform this task and state where in the algorithm it would be
located.
Pseudocode ..............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[5]
START
List1 ←0
List2 ←0
INPUT
List
Yes IS
List = –1 ?
No
INPUT
Value
IS
List = 1 ?
Yes
List1 ← List1 + Value
No
IS
List = 2 ?
Yes
List2 ← List2 + Value
OUTPUT
"List 1 = ", List1
No
OUTPUT OUTPUT
"List 2 = ", List2 "Input Error"
IS Yes
List1 > List2 ?
No
OUTPUT
"List 1 is greatest"
OUTPUT
"List 2 is greatest"
END
Complete the trace table for the algorithm using this input data:
[5]
6 A pet supplier uses the database table, STOCK, to keep records of its products for pets.
(a) (i) Identify the field that could have a Boolean data type.
..................................................................................................................................... [1]
(ii) Identify the field that should be used as the primary key.
..................................................................................................................................... [1]
(b) Complete the query-by-example grid to output the products intended for a cat that are in
stock. Display only the primary key and the name of the products. The output should be
sorted by the primary key.
Field:
Table:
Sort:
Show:
Criteria:
or:
[4]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Section B
an automatic check to make sure the data entered has the correct
number of characters
4(a) One mark for error identified and suggested correction (Max three) 5
One mark for error identified and suggested correction (Max two)
Method 1
Line 1 Continue ← 1 should be Continue ← 0
Line 22 UNTIL Continue = 0 should be ENDWHILE // Line 2 WHILE Continue = 0 should be REPEAT and Line
22 UNTIL Continue = 0 should be Until Continue = 1
OR
Method 2
Line 2 WHILE Continue = 0 should be REPEAT
Line 20 Continue ← 1 should be Continue ← 0 // Line 1 Continue ← 1 should be Continue ← 0 and Line
22 UNTIL Continue = 0 should be Until Continue = 1
OR
Method 3
Line 2 WHILE Continue = 0 should be WHILE Continue = 1
Line 20 Continue ← 1 should be Continue ← 0 and Line 22 UNTIL Continue = 0 should be ENDWHILE
Alternative answer
REPEAT
IF Operator < 1 OR Operator > 4
THEN
OUTPUT "Enter 1, 2, 3 or 4"
INPUT Operator
ENDIF
UNTIL Operator >= 1 AND Operator <= 4
One mark
0 0
77 77
16 93
35 35
-7 86
18 Input Error
11 46
12 58
20 106
-1 List 1 = 58
List 2 = 106
List 2 is greatest
6(a)(i) InStock 1
6(a)(ii) ProductID 1
Sort: Ascending
Show:
or:
Cambridge IGCSE™
* 4 9 1 4 2 9 0 2 3 5 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (RW) 303775/2
© UCLES 2022 [Turn over
121
2
Draw one line from each denary value to the correctly converted 8‑bit binary value.
00100001
41
10100110
00101001
174
10000110
10101110
86
01010110
[3]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Give the correct denary value for the 12‑bit binary value 000101010111
Show all your working.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(a) Give the 8‑bit binary value that would be stored for each pair of hexadecimal digits.
2F
15
D6
[6]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(b) HTML colour codes and Media Access Control (MAC) addresses are two examples of where
hexadecimal is used in Computer Science.
Give two other examples of where hexadecimal can be used in Computer Science.
Example 1 .................................................................................................................................
Example 2 .................................................................................................................................
[2]
Structure ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Presentation .............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(d) Explain why presentation is often separated from structure when creating a web page.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(a) The table contains five terms or definitions that relate to the Internet.
Term Definition
........................................................................................
browser ........................................................................................
........................................................................................
........................................................................................
........................................................................................
........................................................................................
cookie ........................................................................................
........................................................................................
[5]
(b) Joelle uses a firewall to keep her data safe when she uses the Internet.
Tick (3)
(c) Joelle’s parent also uses the firewall to limit the websites that Joelle can access.
Explain how the firewall is used to limit the websites that Joelle can access.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Jason wants to distribute a computer program he has written. He is considering distributing it
to users as freeware or free software.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Explain one benefit to a user if the program is distributed as free software.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.
B X
[5]
(b) Complete the truth table for the given logic statement.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(a) Identify two online security attacks that can be carried out using email.
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
One security method to keep data safe from online attacks is a firewall.
Identify two other security methods that keep data safe from online attacks.
One example of how data can be damaged accidentally is by shutting down a computer
before saving data. To prevent this from happening, a user should make sure they have
saved all data before shutting down a computer.
Complete the table by giving three other examples of how data can be damaged accidentally.
...................................................................... ......................................................................
...................................................................... ......................................................................
...................................................................... ......................................................................
......................................................................
...................................................................... ......................................................................
...................................................................... ......................................................................
...................................................................... ......................................................................
......................................................................
...................................................................... ......................................................................
...................................................................... ......................................................................
...................................................................... ......................................................................
......................................................................
[6]
7 Cassie stores data for her business every day. She stores the data using optical data storage.
Example 1 .................................................................................................................................
Example 2 .................................................................................................................................
Example 3 .................................................................................................................................
[3]
(b) Six statements are given about the operation of three different types of storage.
Tick (3) to show which statements apply to each type of storage. Some statements may
apply to more than one type of storage.
Type of storage
Magnetic Optical Solid state
Statement
(3) (3) (3)
[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Identify three ethical issues that may need to be considered when developing and distributing
software.
Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
00100001
41 10100110
00101001
174
10000110
86 10101110
01010110
1(b) One mark for correct working, one mark for correct answer 2
Working e.g.
256 64 16 4 2 1
Answer:
343
2(a) Two marks each correct conversion (one mark for the first four bits, one mark for the second four bits) 6
0 0 1 0 1 1 1 1
2F
0 0 0 1 0 1 0 1
15
1 1 0 1 0 1 1 0
D6
2(c) One mark for a description, one mark for a correct example 4
Structure
Layout of the web page
e.g. Where text is placed
Presentation
Formatting of the web page
e.g. the colour of the font
The formatting of the page can be changed/edited without needing to alter the structure
… so, they can make regular updates without needing to check the structure
Term Definition
HTTP // HTTPS this is a protocol that is used to send data for web
pages across the Internet
(The parent can) set criteria for the websites she is allowed to visit
… such as a whitelist/blacklist of websites
The firewall will examine the data/traffic incoming and outgoing from her computer
If data is sent from a website that is not allowed, it will be blocked
5(a) One mark for each correct logic gate with correct input(s) 5
A B C Working space X
0 0 0 0
0 0 1 0
0 1 0 0
0 1 1 1
1 0 0 0
1 0 1 0
1 1 0 0
1 1 1 1
6(a) One mark for identifying the attack, two marks for the description 6
Phishing
Email is sent to user to encourage them to click link
… that takes user to fake website
Pharming
Email is sent to user to encourage them to click link/download attachment
… that triggers download of malicious code that will redirect user to fake website
Virus/malware
Email is sent to user to encourage them to click link/download attachment
… that triggers download of virus/malware
Encryption
Password
Two-step / Two-factor authentication/verification
Biometric device
Anti-malware // Anti-virus
Proxy-server
6(c) One mark for identifying an issue, one mark for suggesting a suitable prevention 6
Software failure
Making sure it is always up to date // enable automatic updates
CD
DVD
Blu-ray
Type of storage
e.g.
Copyright
Plagiarism
Production/distribution of malware
Intellectual property theft
Privacy of data
Age appropriation
Offensive materials
Environmental impact of distribution media e.g. CDs
Accessibility of software
Security of software
Following guidelines of professional bodies e.g. ACM/IEEE/BCS
Cambridge IGCSE™
* 6 5 6 8 1 1 8 8 5 0 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Do not attempt Tasks 1, 2 and 3 in the copy of the pre-release material on page 2; these are for
information only.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 50.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (PQ) 303914/4
© UCLES 2022 [Turn over
143
8
Section B
2 An algorithm allows a user to input their password and checks that there are at least eight
characters in the password. Then, the user is asked to re-input the password to check that both
inputs are the same. The user is allowed three attempts at inputting a password of the correct
length and a matching pair of passwords. The pre-defined function LEN(X) returns the number of
characters in the string, X
01 Attempt 0 ←
02 REPEAT
03 PassCheck TRUE ←
04 OUTPUT "Please enter your password "
05 INPUT Password
06 IF LEN(Password) < 8
07 THEN
08 PassCheck TRUE ←
09 ELSE
10 OUTPUT "Please re-enter your password "
11 INPUT Password2
12 IF Password <> Password
13 THEN
14 PassCheck FALSE ←
15 ENDIF
16 ENDIF
17 Attempt ←
Attempt + 1
18 UNTIL PassCheck OR Attempt <> 3
19 IF PassCheck
20 THEN
21 OUTPUT "Password success"
22 ELSE
23 OUTPUT "Password fail"
24 ENDIF
(a) Identify the three errors in the pseudocode and suggest a correction to remove each error.
Error 1 .......................................................................................................................................
Correction .................................................................................................................................
Error 2 .......................................................................................................................................
Correction .................................................................................................................................
Error 3 .......................................................................................................................................
Correction .................................................................................................................................
[3]
(b) The algorithm includes two types of check on the data input.
Identify and describe each type of check.
Description ................................................................................................................................
...................................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
[4]
(c) Give two sets of test data for this algorithm and a reason for choosing each set.
Set 1 .........................................................................................................................................
Reason .....................................................................................................................................
...................................................................................................................................................
Set 2 .........................................................................................................................................
Reason .....................................................................................................................................
...................................................................................................................................................
[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Explain how indexing could be used to search for a value stored in a one-dimensional array.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
4 This algorithm checks the temperature of hot food being served to customers.
Error
START
Counter 0
Hot 0
Cold 0
Serve 0
INPUT Temp
No
Counter No
Counter + 1 OUTPUT
Error
Is Temp Yes
Cold Cold + 1
< 63?
No
OUTPUT
Serve Serve + 1 "Too Cold"
END
(a) Complete the trace table for the algorithm using this input data:
75, 78, 84, 87, 91, 80, 75, 70, 65, 62, –1, 20
[7]
(b) State how the final output from the algorithm could be improved.
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
............................................................................................................................................. [1]
5 A database table, NURSE, is used to keep a record of disposable items worn by veterinary nurses.
DIS4 Suit N 3 70 50
(a) Complete this query-by-example grid to display only the item number and the description of
single use items, where the stock level is below the reorder level.
Field:
Table:
Sort:
Show:
Criteria:
or:
[4]
(b) Give a reason why the field SingleUse is not required in the table NURSE.
...................................................................................................................................................
............................................................................................................................................. [1]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Section B
2(b) One mark check, one mark matching description, max four 4
Check: validation // length check
Description length check // checks number of characters in password
Check: verification // double entry
Description double entry // comparison that two inputs are the same
2(c) One mark per set, one mark matching reason, max four 4
Set 1 – any appropriate example e.g. “small”
Reason must follow through from the password given e.g. abnormal data will be rejected
Set 2 – any different appropriate example e.g. “password” and “password”
Reason must be different and follow through from the password given e.g. normal data will be accepted
0 0 0 0
1 1 75
2 2 78
3 3 84
4 1 87 Too Hot
5 2 91 Too Hot
6 4 80
7 5 75
8 6 70
9 7 65
10 1 62 Too Cold
-1 30 30
4(b) include a message to explain the value output / e. g. “The percentage of meals not served” // 1
outputting Hot, Cold and Serve
Sort:
Show:
or:
Or
Field: ItemNumber Description Uses StockLevel
Sort:
Show:
Criteria: =1 <[ReorderLevel]
or:
5(b) the field Uses already shows this information // duplication of data // redundant data 1
Cambridge IGCSE™
* 6 1 0 4 1 1 8 3 2 6 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (MB) 303733/3
© UCLES 2022 [Turn over
153
2
A customer can use the ticket machine to select and pay for their ticket.
One input device built into the ticket machine is a touch screen.
(a) Identify two other input devices that could be built into the ticket machine.
(b) The ticket machine has a help icon that a user can touch to contact customer support.
The ticket machine has an output device that allows the user to hear the customer support
person.
............................................................................................................................................. [1]
(c) The touch screen for the ticket machine uses resistive technology.
(i) Describe how resistive touch screen technology operates to recognise a user’s touch.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) Give two benefits of using resistive touch screen technology for the ticket machine.
Benefit 1 ............................................................................................................................
...........................................................................................................................................
Benefit 2 ............................................................................................................................
...........................................................................................................................................
[2]
(iii) Give two drawbacks of using resistive touch screen technology for the ticket machine.
Drawback 1 .......................................................................................................................
...........................................................................................................................................
Drawback 2 .......................................................................................................................
...........................................................................................................................................
[2]
(iv) Identify one other touch screen technology that could have been used.
..................................................................................................................................... [1]
(d) The computer in the ticket machine uses the stored program concept.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
One function of the operating system is to provide an interface for the user.
Function 1 .................................................................................................................................
Function 2 .................................................................................................................................
Function 3 .................................................................................................................................
[3]
(f) The computer uses 12-bit binary registers to store data whilst it is being processed.
(i) Give the 12-bit binary value that is stored in the register for each denary ticket number.
100 ....................................................................................................................................
235 ....................................................................................................................................
301 ....................................................................................................................................
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(ii) Show the denary ticket number that would be given to the customer for each 12-bit binary
value.
000000010110 ...................................................................................................................
000001110111 ...................................................................................................................
001101011001 ...................................................................................................................
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
Show the hexadecimal value that represents each of the two 12-bit binary values.
000010010101 ..................................................................................................................
101011010001 ...................................................................................................................
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
2 An automated water tap system uses a sensor and a microprocessor to operate. Water flows
from the tap when a person’s hands are placed underneath the tap. Water stops flowing when the
person’s hands are removed from underneath the tap.
(a) Explain how the water tap system uses a sensor and a microprocessor to operate.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
Identify the most suitable sensor that could be used in each system.
it checks the air is dry enough in a garage that spray paints cars
it checks that the soil in a greenhouse has the correct level of acidity
[3]
3 Five statements are shown about Random Access Memory (RAM), an internal
Solid State Drive (SSD) and a USB flash memory drive.
Tick (✓) to show which statements apply to each component. Some statements may apply to
more than one component.
Component
Internal USB flash
RAM
Statement SSD memory drive
(✓)
(✓) (✓)
it is volatile
State two methods she could use to help prevent accidental loss of data in this way.
Describe how each method would help prevent accidental loss of the data.
Method 1 ..........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Method 2 ..........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
5 8 bytes of data are transmitted from one computer to another. Each byte of data has a parity bit.
The data is also sent with a parity byte. Each bit in the parity byte allows a check to be performed
on each column of bits.
A parity check is performed on the data and an error is found in one bit. The table shows the data
that was received.
Parity
Bit 2 Bit 3 Bit 4 Bit 5 Bit 6 Bit 7 Bit 8
bit
Byte 1 0 1 0 1 0 0 1 1
Byte 2 1 0 0 1 1 1 1 1
Byte 3 1 1 1 1 1 1 0 0
Byte 4 1 1 0 1 0 1 0 1
Byte 5 1 0 0 0 1 1 1 0
Byte 6 1 1 1 0 1 0 1 1
Byte 7 1 1 0 0 1 1 0 0
Byte 8 1 1 1 1 0 0 1 1
Parity
1 0 1 1 0 1 1 1
byte
Identify which bit has an error by giving the Byte number and Bit number.
Explanation ......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
6 Jian has a website that uses the Secure Socket Layer (SSL) protocol to make sure that data is
kept secure during transmission.
(a) Give two ways that a user could check that a website uses the SSL protocol.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) State the name of the updated version of the SSL protocol.
............................................................................................................................................. [1]
Explain why Jian uses a proxy server as part of the system for his website.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(d) Jian sells products using his website. He wants to create a secure login system for user
accounts.
He is worried that a user’s login details may be gathered by malware when they are logging
into their account.
(i) State the type of malware that could be used to gather a user’s login details.
..................................................................................................................................... [1]
(ii) Give three methods that could be used to help prevent a user’s login details being
gathered by malware, when they are logging into their account.
Method 1 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Method 2 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Method 3 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[6]
(e) The paragraph describes how the web pages are obtained and displayed for the user.
Complete the paragraph using the list of terms. Not all terms in the list need to be used.
• browser
• Hypertext Markup Language (HTML)
• Internet Protocol (IP) address
• Internet Service Provider (ISP)
• Media Access Control (MAC) address
• presentation
• protocols
• structure
• Uniform Resource Locator (URL)
• web pages
• web server
.......................................................................................... .
[6]
Tick (✓) to show which statements apply to each logic gate. Some statements may apply to
more than one logic gate.
NAND OR XOR
Statement
(✓) (✓) (✓)
if both inputs are the same as each other, the output is always 0
[4]
(b) NAND, OR, XOR, NOR and NOT are all examples of logic gates.
State the name of one other logic gate and complete its truth table.
A B Output
0 0
0 1
1 0
1 1
[2]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
• Keyboard
• Trackpad
• Trackball
• Microphone
• Keypad
• Sensor
• Button
• Barcode/QR scanner/reader
• Webcam/digital camera
• Speaker
• Headphones
• Cheap to manufacture/buy
• Can still be used whilst wearing gloves
• Waterproof // Can be used in bad weather
• Does not easily shatter
• Low power consumption
• (Can) support multitouch
165
• Capacitive
• Infrared
• Multitasking
• Multiprogramming
• Input and output control
• Running software
• Memory management
• Processor management
• File management
• Handling interrupts
• Providing security
• Managing user accounts
• Batch / real-time processing
166
1(f)(i) • 000001100100 3
• 000011101011
• 000100101101
1(f)(ii) • 22 3
• 119
• 857
1(f)(iii) One mark for two correct characters in the correct place, two marks for three 4
• 095
• AD1
167
it checks the air is dry enough in a garage that spray paints Moisture/humidity
cars
it is volatile ✓
4 One mark for the method, one mark for a corresponding description 4
• Create a back-up
• this means the data can be restored/recovered
• Add verification
• to get the user to confirm they want to delete the data
• Set access rights
• so that she cannot delete any files
170
• Byte 4
• Bit 5
6(d)(i) • Spyware 1
172
6(d)(ii) One mark for a correct method, one mark for a corresponding description 6
6(e) One mark for each correct term in the correct order 6
• URL
• IP address
• Web server
• Web pages
• HTML
• Browser
173
NAND OR XOR
Statement
(✓) (✓) (✓)
if both inputs are the same as each other, the output is always 0 ✓
7(b) One mark for a correct logic gate, one mark for a corresponding truth table 2
• AND
A B Output
0 0 0
0 1 0
1 0 0
1 1 1
174
Cambridge IGCSE™
* 6 4 3 7 4 4 2 5 4 7 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Do not attempt Tasks 1, 2 and 3 in the copy of the pre-release material on page 2; these are for
information only.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 50.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CJ/CB) 303988/3
© UCLES 2022 [Turn over
175
7
Section B
2 Draw a line to connect each programming concept to the most appropriate description.
counting
sequence
branching off to take a course of action depending
on the answer to a question
totalling
[4]
3 Describe the use of verification on input of data when entering a list of items in stock into a
database. Explain why verification is necessary.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [3]
4 Describe one type of test data that must be used to test if a program accepts valid input data.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [2]
5 This pseudocode should allow 500 marks to be entered into the algorithm. If the mark is 80 or
greater it is stored in an array for higher marks. If the mark is less than 80, but greater than or
equal to 50 it is stored in an array for middle marks. The remaining marks are stored in an array
for lower marks. The results from the algorithm are displayed at the end.
01 HighList 0
02 MidList 0
03 LowList 0
04 MarksEntry 0
05 REPEAT
06 INPUT Mark
07 IF Mark >= 80
08 THEN
09 Higher[HighList] MarksEntry
10 HighList HighList + 1
11 ELSE
12 IF Mark >= 50
13 THEN
14 Middle[MidList] Mark
15 MidList MidList
16 ELSE
17 Lower[HighList] Mark
18 LowList LowList + 1
19 ENDIF
20 ENDIF
21 MarksEntry MarksEntry + 1
22 NEXT MarksEntry = 500
23 OUTPUT "You entered ", HighList, " higher marks"
24 OUTPUT "You entered ", MidList, " middle marks"
25 OUTPUT "You entered ", LowList, " lower marks"
(a) Identify the four errors in the pseudocode and suggest a correction for each error.
Error 1 .......................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
Error 2 .......................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
Error 3 .......................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
Error 4 .......................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2022 0478/22/O/N/22
177
9
(b) The corrected algorithm needs to be changed so that any number of marks may be entered
and the algorithm runs until the user tells it to stop.
Write the new pseudocode statements that would be needed to achieve this and state where
in the algorithm they would be placed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
6 This flowchart represents an algorithm to divide three-digit numbers into hundreds, tens and units.
The pre-defined function DIV gives the value of the result of integer division, for example
Y = 9 DIV 4 gives the value Y = 2
The pre-defined function MOD gives the value of the remainder of integer division, for example
R = 9 MOD 4 gives the value R = 1
START
Counter 0
Counter Counter + 1
Yes IS
Counter > 7?
No
INPUT
Number
IS Yes
Number < 100?
No
IS Yes
Number > 999?
No
Complete the trace table for the algorithm using this input data:
[5]
7 A school uses a database table, ASSESS, to keep a record of the internal assessments and the
number of candidates for each of the subjects in its curriculum.
(a) (i) State the most appropriate data type for the fields SubjectCode and Exams.
SubjectCode ......................................................................................................................
Exams ...............................................................................................................................
[1]
(ii) State one reason why the Candidates field could not be of the Boolean data type.
...........................................................................................................................................
..................................................................................................................................... [1]
Sort: Ascending
Show: 3 3
Criteria: <1
or:
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) Complete the query-by-example grid to output the subjects with fewer than 150 candidates.
Display only the SubjectCode, SubjectName and Candidates fields in order of the number of
candidates from largest to smallest.
Field:
Table:
Sort:
Show:
Criteria:
or:
[3]
Section B
totalling
a set of statements to be executed in order
183
MP1 verification is used to make sure the items in stock do not change from the original when they are input //
verification is used to make sure the items in stock do not change from what was intended to be input //
verification is used to make sure the items are accurately copied
MP2 enter each item in stock twice / double entry // visual check
MP3 matching description of the type of check stated in MP2
Example answers
Double entry [1] enter data twice and only accept identical values [1]
Visual check [1] look at the data that has been entered and confirm it matches [1]
Example answers
Normal data (1) data that would be accepted by the program (1)
Boundary / extreme data (1) data that is on the acceptable limits (1)
184
Corrected algorithm
01 HighList 0
02 MidList 0
03 LowList 0
04 MarksEntry 0
05 REPEAT
06 INPUT Mark
07 IF Mark >= 80
08 THEN
09 Higher[HighList] Mark
10 HighList HighList + 1
11 ELSE
12 IF Mark >= 50
13 THEN
14 Middle[MidList] Mark
15 MidList MidList + 1
185
5(a) 16 ELSE
17 Lower[LowList] Mark
18 LowList LowList + 1
19 ENDIF
20 ENDIF
21 MarksEntry MarksEntry + 1
22 UNTIL MarksEntry = 500
23 OUTPUT "You entered ", HighList, " higher marks"
24 OUTPUT "You entered ", MidList, " middle marks"
25 OUTPUT "You entered ", LowList, " lower marks"
186
Example answers
Terminal condition
OUTPUT "Enter -1 to end the program"
should be placed before the loop and / or before the input in 06
IF MARK <> -1 THEN
should be placed between lines 06 and 07
The MarksEntry counter can be removed // Lines 4 and 21 are not required / can be removed
UNTIL Mark = -1 should be placed at line 22
187
1 97
3 4320
5 9875
6 42
8
188
7(a)(ii) The Boolean data type can only have one of two values // the Candidates field has more than two possible values. 1
Expected answer
Geography 200
Geology 80
History 250
Mathematics 350
Sort: Descending
Show:
Criteria: <150
or:
189
Cambridge IGCSE™
*0123456789*
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
Each computer in the network has a media access control (MAC) address.
97–5C–E1
(a) Complete the binary register for these two pairs of digits.
97
5C
[4]
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
.............................................................................................................................................. [4]
1 .................................................................................................................................................
2 ............................................................................................................................................ [2]
0 1 0 1 0 0 1 0
(i) A logical left shift of two places is performed on the binary value.
Complete the binary register to show its contents after this logical left shift.
[1]
(ii) State one effect this logical shift has on the binary value.
............................................................................................................................................
....................................................................................................................................... [1]
(e) Negative denary numbers can also be represented as binary using two’s complement.
Working space............................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
Register:
[2]
(a) The website data is broken down into packets to be transmitted to a user.
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
............................................................................................................................................... [4]
(b) The website hosts videos that users can stream. The company uploads new videos to the
website.
(i) The videos are compressed before they are uploaded to the website.
Tick () one box to show which statement is a benefit of compressing the videos.
A Data is encrypted.
(ii) Give two methods of compression that could be used to compress the videos.
1 .........................................................................................................................................
2 .................................................................................................................................... [2]
(iii) The company uses parallel half-duplex data transmission to transmit the data for the
new videos to the web server.
Explain why parallel half-duplex data transmission is the most appropriate method.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
....................................................................................................................................... [4]
(c) The company is concerned about a distributed denial of service (DDoS) attack.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
....................................................................................................................................... [4]
(ii) Suggest one security device that can be used to help prevent a DDoS attack.
....................................................................................................................................... [1]
1 .........................................................................................................................................
2 .........................................................................................................................................
3 .................................................................................................................................... [3]
(ii) Identify the network component that uses the IP address to send data only to its correct
destination.
....................................................................................................................................... [1]
https://www.cambridgeassessment.org.uk/index.html
Complete the table to identify the name of each section of the URL.
(a) Circle three components that are part of the central processing unit (CPU) in this computer.
accumulator (ACC) hard disk drive (HDD) memory address register (MAR)
(b) Describe the purpose of the control unit (CU) within this computer.
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
............................................................................................................................................... [2]
............................................................................................................................................
....................................................................................................................................... [1]
Explain how the upgrade can affect the performance of the computer.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
....................................................................................................................................... [2]
Tick () one box to show the part of a computer of which the bootstrap is an example.
A application software
B firmware
D MAC address
[1]
(a) (i) Identify two advantages to the programmer of using a high-level language instead of a
low-level language.
1 .........................................................................................................................................
2 .................................................................................................................................... [2]
(ii) Suggest one disadvantage to the programmer of using a high-level language instead of
a low-level language.
....................................................................................................................................... [1]
(b) The programmer uses an integrated development environment (IDE) when creating the
computer program.
....................................................................................................................................................
............................................................................................................................................... [1]
1 .................................................................................................................................................
2 ............................................................................................................................................ [2]
(b) Suggest two advantages of using robots, instead of humans, to build cars in the factory.
1 .................................................................................................................................................
2 ........................................................................................................................................... [2]
7 The Unicode character set is used to represent text that is typed into a computer.
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
............................................................................................................................................... [2]
(b) One disadvantage of using the Unicode character set, instead of the ASCII character set, is
that the text stored takes up more storage space.
....................................................................................................................................................
............................................................................................................................................... [1]
8 (a) Draw a diagram to represent how virtual memory is created and used.
[4]
(b) A student is using software to create 3D models. This process often requires the use of
virtual memory.
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
............................................................................................................................................... [3]
Some of the terms in the list will not be used. You should only use a term once.
of .................................................., is used.
10 An art gallery uses secure socket layer (SSL) to provide a secure connection when selling art on
its website.
Describe the process of SSL and explain how it provides a secure connection.
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...................................................................................................................................................... [6]
97 1 0 0 1 0 1 1 1
5C 0 1 0 1 1 1 0 0
1(d)(ii) The value becomes incorrect because the left most bits are lost. 1
1(e) One mark for method, e.g. conversion to binary then flipping and adding 1. 2
One mark for correct answer.
1 1 0 0 1 0 1 0
For example:
Hard drive
RAM Transfer of pages Virtual
memory
plain
algorithm/key
key/algorithm
cipher
understood
Cambridge IGCSE™
*0123456789*
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
(a) Draw a line to link each pseudocode description to the most appropriate pseudocode
statement.
FOR…TO…NEXT
IF…THEN…ELSE…ENDIF
WHILE…DO…ENDWHILE
CASE…OF…OTHERWISE…ENDCASE
REPEAT…UNTIL
[4]
(b) Using a single loop, write an algorithm in pseudocode to output 50 names that have been
stored in the array, Name[]
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
................................................................................................................................................[3]
2 Describe the purpose of validation and verification checks during data entry.
Validation check.................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
Verification check...............................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
[4]
3 Tick () one box to show the named section of a program that performs a specific task.
A file
B function
C parameter
D process
[1]
Draw a structure diagram for this part of the satellite navigation system.
[4]
5 An algorithm has been written in pseudocode to input some numbers. It only outputs any numbers
that are greater than or equal to 100. The number 999 is not output and stops the algorithm.
INPUT Number
WHILE Numbers <> 999 DO
IF Number > 100
THEN
OUTPUT Number
ENDIF
ENDWHILE
OUTPUT Number
(a) Identify the four errors in the pseudocode and suggest corrections.
Error 1 ........................................................................................................................................
Correction ..................................................................................................................................
....................................................................................................................................................
Error 2 ........................................................................................................................................
Correction ..................................................................................................................................
....................................................................................................................................................
Error 3 ........................................................................................................................................
Correction ..................................................................................................................................
....................................................................................................................................................
Error 4 ........................................................................................................................................
Correction ..................................................................................................................................
....................................................................................................................................................
[4]
(b) Write a pseudocode statement to change the corrected algorithm to output all numbers
between 100 and 200 inclusive.
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
............................................................................................................................................... [2]
B X
[4]
(b) Complete the truth table from the given logic expression.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
START
Flag 0
Count 1
IS Name[Count] Yes
> Name[Count + 1]? Temp Name[Count]
No Name[Count] Name[Count + 1]
Name[Count + 1] Temp
Flag 1
Count Count + 1
No IS Count
=4?
Yes
No IS Flag
=0?
Yes
STOP
(a) The array Name[1:4] used in the flowchart contains the following data:
Complete the trace table using the data given in the array.
[5]
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
............................................................................................................................................... [2]
8 A programmer has written an algorithm to check that prices are less than $10.00
10.00 .................................................................................................................................................
...........................................................................................................................................................
9.99 ...................................................................................................................................................
...........................................................................................................................................................
ten .....................................................................................................................................................
...........................................................................................................................................................
[3]
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...................................................................................................................................................... [3]
Tick () one box which accurately describes the use of the variable Inches
A answer
B call
C parameter
D response
[1]
© UCLES 2020 0478/02/SP/23
215
11
............................................................................................................................................... [1]
(b) (i) Give the name of the field that would be used for the primary key.
....................................................................................................................................... [1]
(ii) State the reason for choosing this field for the primary key.
............................................................................................................................................
....................................................................................................................................... [1]
(c) Complete the table to identify the most appropriate data type for each field based on the data
shown in the database table, 2018MOV.
CatNo
Title
Genre1
Streaming
[2]
(d) Complete the structured query language (SQL) to return the category number and title for all
Comedy movies.
.................................................. 2018MOV
• X stores a string
• Y stores a position in the string (e.g. 2)
• Z stores the number of characters in the string.
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
............................................................................................................................................... [3]
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
............................................................................................................................................... [6]
13 The 1D array StudentName[] contains the names of students in a class. The 2D array
StudentMark[] contains the mark for each subject, for each student. The position of
each student’s data in the two arrays is the same, for example, the student in position 10 in
StudentName[] and StudentMark[] is the same.
The variable ClassSize contains the number of students in the class. The variable SubjectNo
contains the number of subjects studied. All students study the same number of subjects.
The arrays and variables have already been set up and the data stored.
You must use pseudocode or program code and add comments to explain how your code works.
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
© UCLES 2020 0478/02/SP/23 [Turn over
0478/02 Cambridge IGCSE – Mark Scheme For examination
SPECIMEN from220
2023
FOR…TO…NEXT
IF…THEN…ELSE…ENDIF
WHILE…DO…ENDWHILE
CASE…OF…OTHERWISE…ENDCASE
REPEAT…UNTIL
Note: reading and the output MUST be within the same loop.
For example:
Count ← 0
WHILE Count < 50 DO
OUTPUT Name[Count]
Count ← Count + 1
ENDWHILE
Verification check
For example:
B X
6(b) 4
A B C X
0 0 0 0
0 0 1 0
0 1 0 1
0 1 1 0
1 0 0 0
1 0 1 0
1 1 0 1
1 1 1 1
10.00 boundary / abnormal data // the price should be rejected // value is out of range
9.99 boundary / extreme / normal data // the price should be accepted // value is within normal range
ten abnormal data // input should be rejected // value is wrong type
11(d) FROM 2
"Comedy"
DECLARE X : STRING
DECLARE Y : INTEGER
DECLARE Z : INTEGER
12(b) One mark for storing string in X. 6
One mark for calling the function length.
One mark for using the correct parameter X.
One mark for using the substring function.
One mark for correct parameters.
One mark for outputting length and substring return values.
For example:
X ← "Programming is fun"
OUTPUT Length(X)
Y ← 16
Z ← 3
OUTPUT SubString(X,Y,Z)
The techniques and the data structures required are listed below. The requirements may be met using a suitable built-in
function from the programming language used (e.g. Python, VB.NET or Java).
Techniques required:
R1 Calculate total mark for each student (iteration and totalling).
R2 Calculate average mark for each student rounded to the nearest whole number.
R3 Selection of grade for each student (selection).
R4 Output for each student name, total mark, average mark, grade awarded (output with appropriate messages).
R5 Calculate, store and output the number of distinctions, merits, passes and fails for the whole class (iteration,
counting and output with appropriate messages).
// meaningful identifier names and appropriate data structures (variables, constants and the
// given arrays) to store all the data required
DECLARE TotalMark : ARRAY[1:50] OF INTEGER
DECLARE AverageMark : ARRAY[1:50] OF INTEGER
DECLARE SubjectCounter : INTEGER
DECLARE StudentCounter : INTEGER
DECLARE DistinctionNo : INTEGER
DECLARE MeritNo : INTEGER
DECLARE PassNo : INTEGER
DECLARE FailNo : INTEGER
CONSTANT Distinction = 70
CONSTANT Merit = 55
CONSTANT Pass = 40
// initialisation processes for this scenario, initialising the running totals used for
// grades and combined totals
DistinctionNo ← 0
MeritNo ← 0
PassNo ← 0
FailNo ← 0
// programming techniques of iteration, selection, totalling, counting and output are used
4(b)(i) Router 1
5(a) C 1
7(a) One mark for each part of the diagram (MAX six). 6
The diagram demonstrates:
Malware downloaded to several computers
… turning it into a bot/zombie
… creating a network of bots/zombies
Third party/hacker initiating the attack
Bots send requests to a web server at the same time
The web server fails due to the requests
Legitimate requests cannot reach the web server
BOT
Botnet Web
Requests
server
BOT BOT
Computer
8(a) C 1
1 A 1
AND
OR
NAND
NOT
4(b)(i) To verify the data / for verification / as a verification check // to make sure that no changes are made to the data on entry 1
For example
REPEAT
OUTPUT "Please enter measurement "
INPUT Measurement
OUTPUT "Please re-enter measurement "
INPUT MeasurementCheck
UNTIL Measurement = MeasurementCheck
5 Due to an issue with Question 5, the question has been removed from the question paper.
6 One mark for each feature and one mark for corresponding example (max six) 6
ensuring that all identifiers have meaningful names …
… example using Total to store a running total
using comments to explain how the program works …
… example // all values are zeroed before the next calculation
using procedures and functions for the tasks within a program …
… example CalculateInterest(Deposit, Rate)
7(a) 07 3
04/12 or 16/18
02/20
Example
REPEAT
OUTPUT "Enter a digit "
INPUT Number[Counter]
UNTIL Number[Counter] = Round(Number[Counter],0) AND ((Number[Counter] = -1) OR
(Number[Counter] > 0 AND Number[Counter] < 10))
A B C X
0 0 0 0
0 0 1 0
0 1 0 0
0 1 1 0
1 0 0 0
1 0 1 1
1 1 0 0
1 1 1 0
10 1 5 7 11
0 1 10
1 2 1 10 10
1 3 5 10 10
1 4 7 10
0 1
10(a) SongNumber 1
SongNumber Text/Alphanumeric
Title Text/Alphanumeric
Recorded Date/time
Minutes Real
DECLARE P : STRING
P "The world"
DECLARE Q : CHAR
Q 'W'
For example:
P UCASE(P)
Counter 1
Position 0
REPEAT
IF SUBSTRING(P, Counter, 1) = Q
THEN
Position Counter
ENDIF
Counter Counter + 1
UNTIL Position <> 0 OR Counter = LENGTH(P)
11(c) 5 1
Data Structures required names shown underlined must be used as given in the scenario
Arrays or lists Account, AccDetails
Variable Size, AccountNumber
Requirements (techniques)
R1 Check account number and password (iteration and validation, selection, input, output)
R2 Display menu and make a selection (output, input and selection)
R3 Perform actions selected (use of arrays and procedures with parameters)
12 Valid True
ENDIF
ENDIF
ENDPROCEDURE
12 ENDPROCEDURE
IF Valid
THEN
REPEAT
OUTPUT "Menu"
OUTPUT "1. display balance"
OUTPUT "2. withdraw money"
OUTPUT "3. deposit money"
OUTPUT "4. exit"
OUTPUT "please choose 1, 2, 3 or 4"
INPUT Choice
CASE OF Choice
1 : Balance(AccountNumber)
2 : Withdrawal(AccountNumber)
3 : Deposit(AccountNumber)
4 : Exit TRUE
OTHERWISE OUTPUT "Invalid choice"
ENDCASE
UNTIL Choice = 4
ELSE
OUTPUT "Invalid account number "
ENDIF
AO2: Apply knowledge and understanding of the principles and concepts of computer science to a given context, including the
analysis and design of computational or programming problems
At least one programming technique Some programming techniques used The range of programming techniques
has been used. are appropriate to the problem. used is appropriate to the problem.
Any use of selection, iteration, More than one technique seen applied All criteria stated for the scenario have
counting, totalling, input and output. to the scenario, check the list of been covered by the use of
techniques needed. appropriate programming techniques,
No creditable check the list of techniques needed.
response.
Some data has been stored but not Some of the data structures chosen The data structures chosen are
appropriately. are appropriate and store some of the appropriate and store all the data
data required. required.
Any use of variables or arrays or other
language dependent data structures More than one data structure used to The data structures used store all the
e.g. Python lists. store data required by the scenario. data required by the scenario.
Program seen without relevant Program seen with some relevant The program has been fully
comments. comment(s). commented.
Some identifier names used are The majority of identifiers used are Suitable identifiers with names
appropriate. appropriately named. meaningful to their purpose have been
used throughout.
Some of the data structures used have Most of the data structures used have
meaningful names. meaningful names. All of the data structures used have
meaningful names.
The solution is illogical. The solution contains parts that may The program is in a logical order.
be illogical.
No creditable The solution is inaccurate in many The solution contains parts that are The solution is accurate.
response. places. inaccurate.
Solution logically performs all the tasks
Solution contains few lines of code Solution contains lines of code with given in the scenario. Ignore minor
with errors that attempt to perform a some errors that logically perform syntax errors.
task given in the scenario. tasks given in the scenario. Ignore
minor syntax errors.
The solution attempts at least one of The solution meets most of the The solution meets all the
the requirements. requirements. requirements given in the question.
Solution contains lines of code that Solution contains lines of code that Solution performs all the tasks given in
attempt at least one task given in the perform most tasks given in the the scenario.
scenario. scenario.
Cambridge IGCSE™
* 8 4 5 6 7 7 9 7 4 9 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (EF) 313965/2
© UCLES 2023 [Turn over
250
2
(a) Tick (3) one box to show which statement about the binary number system is correct.
A It is a base 1 system
B It is a base 2 system
C It is a base 10 system
D It is a base 16 system
[1]
50 ..............................................................................................................................................
102 ............................................................................................................................................
221 ............................................................................................................................................
[3]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Register:
[2]
00110011
+01100001
[3]
(e) Two binary numbers are added by a computer and an overflow error occurs.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
2 A student has a sound file that is too large to be stored on their external secondary storage device.
The student compresses the sound file to make the file size smaller.
The compression method used reduces the sample rate and the sample resolution of the sound
file.
(a) State what is meant by the sample rate and sample resolution.
...................................................................................................................................................
...................................................................................................................................................
[2]
(b) Identify which type of compression has been used to compress the sound file.
...................................................................................................................................................
............................................................................................................................................. [1]
(c) The student sends the sound file to a friend. The file is transmitted across a network that uses
packet switching.
(i) Identify two pieces of data that would be included in the header of each packet.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
hard disk drive (HDD) random access memory (RAM) read only memory (ROM)
[3]
(b) Tick (3) one box to show which statement about secondary storage is correct.
D It is volatile.
[1]
Some of the terms in the list will not be used. You should only use a term once.
the ........................................................................ .
[4]
5 A farm has an automated drinking system for its animals. The drinking system has a water bowl
that contains the water. When the water bowl is empty, it is automatically refilled.
............................................................................................................................................. [1]
(b) Describe how the sensor and the microprocessor are used to automatically refill the water
bowl.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(a) (i) Identify the component in the computer that is needed to access a network.
..................................................................................................................................... [1]
(ii) Identify the type of address that is allocated to the component by the manufacturer,
which is used to uniquely identify the device.
..................................................................................................................................... [1]
(b) A dynamic internet protocol (IP) address is allocated to the computer when it is connected to
the network.
(i) Identify the device on the network that can connect multiple devices and automatically
assign them an IP address.
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
7 A programmer uses a low‑level language to write a computer program for a vending machine.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Give two reasons why the programmer would choose to write the computer program in a
low‑level language instead of a high‑level language.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2023 0478/11/M/J/23 [Turn over
256
8
8 A manager at a company is concerned about a brute‑force attack on its employee user accounts.
(a) Describe how a brute‑force attack can be used to gain access to the employee user accounts.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) One possible aim for carrying out a brute‑force attack is to install malware onto the company
network.
(i) State two other aims for carrying out a brute‑force attack to gain access to the employee
user accounts.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(c) Give two security solutions that could be used to help prevent a brute‑force attack being
successful.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Give two advantages to company employees of using robots to manufacture large pieces of
furniture.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(c) Give one disadvantage to the company’s owners of using robots to manufacture large pieces
of furniture.
...................................................................................................................................................
............................................................................................................................................. [1]
10 A student uses the internet for their schoolwork to research what is meant by pharming.
...................................................................................................................................................
............................................................................................................................................. [1]
[4]
(c) The student uses a web browser to access data on the internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(e) A student visits a website that uses session cookies, instead of persistent cookies.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
Note: No marks are awarded for using brand names of software packages or hardware.
1(a) B 1
00110010
01100110
11011101
1(c) One mark for full method of working e.g. conversion to binary then flipping and adding 1 2
One mark for correct answer
10110010
1 1 11
0 0 1 1 0 0 1 1
0 1 1 0 0 0 0 1
10 0 1 0100
3(b) C 1
6(b)(i) Router 1
e.g.
User types in
web address
User
Real
computer
website
malware
Fake
Request website
gets
User clicks link that redirected
downloads malware
to computer
Cambridge IGCSE™
* 8 1 0 7 6 2 2 0 5 5 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (EF) 313966/2
© UCLES 2023 [Turn over
269
2
10010011 ..................................................................................................................................
00001101 ..................................................................................................................................
[4]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
0 1 1 1 1 0 1 0
(i) Complete the binary register to show its contents after this logical right shift.
[1]
(ii) State one effect this logical shift has on the binary number.
...........................................................................................................................................
..................................................................................................................................... [1]
(c) Give two reasons why a programmer may use hexadecimal to represent binary numbers.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 When keys are pressed on a keyboard, the text is converted to binary to be processed by the
computer.
(a) Describe how the text is converted to binary to be processed by the computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Text that is input into a computer can be stored in a text file.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(iii) Give two reasons why the text file may have been compressed.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
The student needs to transmit the photographs to their computer. They could use serial data
transmission or parallel data transmission to transmit the photographs.
(a) (i) Describe how the photographs would be transmitted using serial data transmission.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Give two benefits of transmitting the photographs using serial data transmission.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(iii) State one benefit of the student using parallel data transmission instead of serial data
transmission.
...........................................................................................................................................
..................................................................................................................................... [1]
(b) The photographs are also transmitted across a network to cloud storage. A device on the
network forwards the data towards its correct destination.
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(iii) Give one disadvantage of storing the photographs in cloud storage instead of storing
them locally.
...........................................................................................................................................
..................................................................................................................................... [1]
© UCLES 2023 0478/12/M/J/23 [Turn over
273
6
(a) Tick (3) one box to show which statement is correct about writing computer programs in a
high‑level language.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(c) The programmer uses an integrated development environment (IDE) to create the computer
program.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
Some of the terms in the list will not be used. Some terms may be used more than once.
secondary storage.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
[6]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(c) Give two security solutions that can be used to help prevent a DDoS attack being successful.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(a) Tick (3) one box to show which device would assign the IPv4 address to the computer.
C Router
D Web server
[1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
10 A user has both system software and application software installed on their computer.
(a) Describe the difference between system software and application software.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) State which component in the computer would store both types of software when the power is
turned off.
............................................................................................................................................. [1]
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
Note: No marks are awarded for using brand names of software packages or hardware.
2(a) One mark per each correct character in the correct order: 4
9
3
0
D
2(b)(i) 00001111 1
2(d) One mark for two correct characters, two marks for three correct characters in the correct order: 2
1
2
D
4(b)(i) Router 1
5(a) C 1
7(a) One mark for each part of the diagram (MAX six). 6
The diagram demonstrates:
Malware downloaded to several computers
… turning it into a bot/zombie
… creating a network of bots/zombies
Third party/hacker initiating the attack
Bots send requests to a web server at the same time
The web server fails due to the requests
Legitimate requests cannot reach the web server
BOT
Botnet Web
Requests
server
BOT BOT
Computer
8(a) C 1
Cambridge IGCSE™
* 4 6 2 4 3 2 5 5 3 0 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CJ) 313967/3
© UCLES 2023 [Turn over
288
2
............................................................................................................................................. [1]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(c) A logical left shift of three places is performed on the binary number.
(i) Give the 8-bit binary number that would be stored after this logical left shift.
..................................................................................................................................... [1]
(ii) Tick (3) one box to show which statement is true about the impact the logical left binary
shift would have on the binary number.
(d) Add the two 8-bit binary numbers 11101110 and 00110001 using binary addition.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Calculate the least number of bits that can be used to store the denary number 301.
............................................................................................................................................. [1]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Calculate the least number of bits that can be used to store the hexadecimal number A4D.
............................................................................................................................................. [1]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 A library has a self-checkout system that allows customers to register books that they want to
borrow.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) The CPU is replaced with one that has four cores.
Explain the effect this has on the performance of the self-checkout system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Identify one bus that can be found in the CPU and explain its purpose in the
fetch–decode–execute cycle.
Bus ....................................................................................................................................
Purpose .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(d) The self-checkout system allows the user to input their library membership number.
Give two appropriate input devices that would allow the user to do this.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(e) The self-checkout system uses a monitor to display information about the book.
Users who are blind also need to use the self-checkout system.
Give an appropriate output device that would allow a blind user to be given this information.
............................................................................................................................................. [1]
Circle two types of primary storage that would be used in the system.
read only memory (ROM) universal serial bus (USB) flash memory drive
[2]
(g) The self-checkout system is linked to a stock control system that is updated every time a
book is borrowed from the library.
Explain the role of the microprocessor in this system and how it is used to update the stock
when a book is borrowed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Term Definition
.............................................................................................
.............................................................................................
router
.............................................................................................
.............................................................................................
.............................................................................................
.............................................................................................
network interface card (NIC)
.............................................................................................
.............................................................................................
(a) Tick (3) one box to show which statement is a benefit of writing a program in a high-level
language, instead of a low-level language.
(b) Translators are used to translate the high-level language so that it can be processed by the
computer.
..................................................................................................................................... [1]
(ii) One translator converts and executes the code line by line.
..................................................................................................................................... [1]
(iii) One translator creates an error report displaying all the errors in the code before it can
be executed.
..................................................................................................................................... [1]
..................................................................................................................................... [1]
5 Complete and annotate the diagram to demonstrate how packet switching is used to transmit data
across a network, including the use of routers, from Device A to Device B.
Device A Device B
[4]
6 A student is writing a help guide about how to recognise and avoid the cyber-security threat of
pharming.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(b) The student also wants to include information in the help guide about the use of social
engineering as a cyber-security threat.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) The student includes information about the security solution of access levels.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
7 The rule base and the inference engine are two components of an expert system.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Some of the terms in the list will not be used. You should only use a term once.
When the attacker wants the DDoS to take place, repeated requests are simultaneously sent from
this hardware.
[5]
9 A device can be given an internet protocol (IP) address. This can be an IPv4 or IPv6.
...................................................................................................................................................
............................................................................................................................................. [1]
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(i) Identify the system that stores a database of uniform resource locators (URLs) and their
corresponding IP addresses.
..................................................................................................................................... [1]
(ii) Identify the software that sends a request to the IP address to obtain the web page data.
..................................................................................................................................... [1]
10 A computer has pages A, B and C that are stored in RAM. Page D needs to be sent to the RAM
but the RAM is full.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
(a) State the name of the software that can do these tasks.
............................................................................................................................................. [1]
(b) Give one task that the software allows the user to do to manage files.
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
............................................................................................................................................. [1]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
Cambridge IGCSE™
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2023 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond
the scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.
Note: No marks are awarded for using brand names of software packages or hardware.
1(a) 174 1
1(b) A 2
E
1(c)(i) 01110000 1
1(c)(ii) B 1
11
1 0001 1111
1(e) 1
9
1(f) 1
12
2(c)(ii) One mark for correct name of bus. Two marks for matching description. 3
Address bus
Transmit / carries addresses …
… between components in the CPU
Control bus
Transmits control signals …
… from the control unit to other components in the CPU
Term Definition
IP address this address is assigned by the network and used to identify a device on a network
network interface card (NIC) this is a component in a device that enables it to connect to a network
MAC address this address is assigned by the manufacturer and is used to uniquely identify the device
firewall // proxy-server this can be hardware or software based and filters traffic coming into and out of a network
4(a) B 1
4(b)(ii) Interpreter 1
4(b)(iii) Compiler 1
4(b)(iv) Compiler 1
7(a) Interface 2
Knowledge base
Malware
Bot
Botnet
Web server
Website
IPv4 is 32-bit
… IPv6 is 128-bit
11(d) Interrupt 1
Cambridge IGCSE™
* 4 7 9 7 8 7 7 8 2 9 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (RW/SW) 313988/5
© UCLES 2023 [Turn over
310
2
1 Tick (✓) one box to identify the first stage of the program development life cycle.
A Analysis
B Coding
C Design
D Testing
[1]
2 Four logic gates and five standard symbols for logic gates are shown.
Draw one line to link each logic gate to its standard symbol. Not all standard symbols will be used.
AND
OR
NAND
NOT
[4]
3 Identify three different ways that the design of a solution to a problem can be presented.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
[3]
4 A program needs to make sure the value input for a measurement meets the following rules:
• the value is a positive number
• a value is always input
• the value is less than 1000.
(a) Describe the validation checks that the programmer would need to use.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) The program needs editing to include a double entry check for the value input.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
6 State three different features of a high-level programming language that a programmer could use
to make sure that their program will be easier to understand by another programmer.
Give an example for each feature.
Feature 1 ..........................................................................................................................................
..........................................................................................................................................................
Example ...........................................................................................................................................
..........................................................................................................................................................
Feature 2 ..........................................................................................................................................
..........................................................................................................................................................
Example ...........................................................................................................................................
..........................................................................................................................................................
Feature 3 ..........................................................................................................................................
..........................................................................................................................................................
Example ...........................................................................................................................................
..........................................................................................................................................................
[6]
7 An algorithm has been written in pseudocode to calculate a check digit for a four-digit number.
The algorithm then outputs the five-digit number including the check digit.
The algorithm stops when –1 is input as the fourth digit.
01 Flag FALSE
02 REPEAT
03 Total 0
04 FOR Counter 1 TO 4
05 OUTPUT "Enter a digit ", Counter
06 INPUT Number[Counter]
07 Total Total + Number * Counter
08 IF Number[Counter] = 0
09 THEN
10 Flag TRUE
11 ENDIF
12 NEXT Counter
13 IF NOT Flag
14 THEN
15 Number[5] MOD(Total, 10)
16 FOR Counter 0 TO 5
17 OUTPUT Number[Counter]
18 NEXT
19 ENDIF
20 UNTIL Flag
Totalling ....................................................................................................................................
(b) Identify the three errors in the pseudocode and suggest a correction for each error.
Error 1 .......................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
Error 2 .......................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
Error 3 .......................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
[3]
(c) The algorithm does not check that each input is a single digit.
Identify the place in the algorithm where this check should occur.
Write pseudocode for this check.
Your pseudocode must make sure that the input is a single digit and checks for –1
Pseudocode ..............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
START
F 0
C 1
IS X[C] < No
T X[C]
X[C + 1]?
Yes
X[C] X[C + 1]
X[C + 1] T
F 1
C C + 1
No
IS C = 5?
Yes
No
IS F = 0?
Yes
STOP
(a) The array X[1:5] used in the flowchart contains this data:
10 1 5 7 11
Complete the trace table by using the data given in the array.
10 1 5 7 11
[5]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
10 A music streaming service has a new database table named Songs to store details of songs
available for streaming. The table contains the fields:
• SongNumber – the catalogue number, for example AG123
• Title – the title of the song
• Author – the name of the song writer(s)
• Singer – the name of the singer(s)
• Genre – the type of music, for example rock
• Minutes – the length of the song in minutes, for example 3.75
• Recorded – the date the song was recorded.
(a) Identify the field that will be the most appropriate primary key for this table.
............................................................................................................................................. [1]
(b) Complete the table to identify the most appropriate data type for the fields in Songs
SongNumber
Title
Recorded
Minutes
[2]
(c) Explain the purpose of the structured query language (SQL) statements.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
11 The variables P and Q are used to store data in a program. P stores a string. Q stores a character.
(a) Write pseudocode statements to declare the variables P and Q, store "The world" in P and
store 'W' in Q
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(c) Give the value of Position after the algorithm has been executed with the data in
question 11(a).
...................................................................................................................................................
............................................................................................................................................. [1]
12 A two-dimensional (2D) array Account[] contains account holders’ names and passwords for a
banking program.
The amount of money in a bank account can be negative (overdrawn) but not by more than the
overdraft limit.
For example, an account with an overdraft limit of 100.00 must have a balance that is greater than
or equal to –100.00
Suitable error messages must be displayed if a withdrawal cannot take place, for example if the
overdraft limit or the size of withdrawal is exceeded.
The bank account ID gives the index of each account holder’s data held in the two arrays.
For example, account ID 20’s details would be held in:
Account[20,1] and Account[20,2]
AccDetails[20,1] AccDetails[20,2] and AccDetails[20,3]
The arrays and variable Size have already been set up and the data stored.
You must use pseudocode or program code and add comments to explain how your code works.
All inputs and outputs must contain suitable messages.
You only need to declare any local arrays and local variables that you use.
You do not need to declare and initialise the data in the global arrays Account[] and
AccDetails[] and the variable Size
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
© UCLES 2023 0478/22/M/J/23
320
13
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
© UCLES 2023 0478/22/M/J/23 [Turn over
321
14
..........................................................................................................................................................
.........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................. [15]
© UCLES 2023 0478/22/M/J/23
0478/22 Cambridge IGCSE – Mark Scheme 322
May/June 2023
PUBLISHED
Question Answer Marks
1 A 1
AND
OR
NAND
NOT
4(b)(i) To verify the data / for verification / as a verification check // to make sure that no changes are made to the data on entry 1
For example
REPEAT
OUTPUT "Please enter measurement "
INPUT Measurement
OUTPUT "Please re-enter measurement "
INPUT MeasurementCheck
UNTIL Measurement = MeasurementCheck
5 Due to an issue with Question 5, the question has been removed from the question paper.
6 One mark for each feature and one mark for corresponding example (max six) 6
ensuring that all identifiers have meaningful names …
… example using Total to store a running total
using comments to explain how the program works …
… example // all values are zeroed before the next calculation
using procedures and functions for the tasks within a program …
… example CalculateInterest(Deposit, Rate)
7(a) 07 3
04/12 or 16/18
02/20
Example
REPEAT
OUTPUT "Enter a digit "
INPUT Number[Counter]
UNTIL Number[Counter] = Round(Number[Counter],0) AND ((Number[Counter] = -1) OR
(Number[Counter] > 0 AND Number[Counter] < 10))
A B C X
0 0 0 0
0 0 1 0
0 1 0 0
0 1 1 0
1 0 0 0
1 0 1 1
1 1 0 0
1 1 1 0
10 1 5 7 11
0 1 10
1 2 1 10 10
1 3 5 10 10
1 4 7 10
0 1
10(a) SongNumber 1
SongNumber Text/Alphanumeric
Title Text/Alphanumeric
Recorded Date/time
Minutes Real
DECLARE P : STRING
P "The world"
DECLARE Q : CHAR
Q 'W'
For example:
P UCASE(P)
Counter 1
Position 0
REPEAT
IF SUBSTRING(P, Counter, 1) = Q
THEN
Position Counter
ENDIF
Counter Counter + 1
UNTIL Position <> 0 OR Counter = LENGTH(P)
11(c) 5 1
Data Structures required names shown underlined must be used as given in the scenario
Arrays or lists Account, AccDetails
Variable Size, AccountNumber
Requirements (techniques)
R1 Check account number and password (iteration and validation, selection, input, output)
R2 Display menu and make a selection (output, input and selection)
R3 Perform actions selected (use of arrays and procedures with parameters)
12 Valid True
ENDIF
ENDIF
ENDPROCEDURE
12 ENDPROCEDURE
IF Valid
THEN
REPEAT
OUTPUT "Menu"
OUTPUT "1. display balance"
OUTPUT "2. withdraw money"
OUTPUT "3. deposit money"
OUTPUT "4. exit"
OUTPUT "please choose 1, 2, 3 or 4"
INPUT Choice
CASE OF Choice
1 : Balance(AccountNumber)
2 : Withdrawal(AccountNumber)
3 : Deposit(AccountNumber)
4 : Exit TRUE
OTHERWISE OUTPUT "Invalid choice"
ENDCASE
UNTIL Choice = 4
ELSE
OUTPUT "Invalid account number "
ENDIF
Cambridge IGCSE™
* 1 8 6 2 2 6 2 8 5 3 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (EF) 313505/3
© UCLES 2023 [Turn over
334
2
A Software that activates a webcam and transmits the video to a third party
that outputs it live on a website.
B Software that detects when a password is being entered and then emails
the password to a third party.
C Software that records all data entered into a computer, analyses this data
to find email addresses and passwords, then posts these to a website.
D Software that records all key presses and transmits these to a third party.
[1]
(b) Complete the table by identifying and describing two other examples of malware.
Malware Description
...........................................................................................................
...........................................................................................................
......................................
1 ...........................................................................................................
......................................
...........................................................................................................
...........................................................................................................
...........................................................................................................
...........................................................................................................
......................................
2 ...........................................................................................................
......................................
...........................................................................................................
...........................................................................................................
[6]
Identify two similarities and one difference between proxy‑servers and firewalls.
Similarity 1 ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Similarity 2 ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Difference .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
2 A programmer has designed a three‑dimensional (3D) interactive computer game. They are going
to develop a program for the game. The program needs to run efficiently, but it must also be
developed as soon as possible.
(a) Tick (✓) one box to identify whether the programmer should use a high‑level language or a
low‑level language to develop the program.
High‑level language
Low‑level language
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) If the programmer chooses a high‑level language, they can use a compiler or an interpreter to
translate the high‑level language into a low‑level language.
Compiler ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Interpreter .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...................................................................................................................
pixel ...................................................................................................................
...................................................................................................................
...................................................................................................................
resolution ...................................................................................................................
...................................................................................................................
[2]
(b) One of the images has a resolution of 1000 × 1000 and a colour depth of 2 bytes.
Calculate the file size of the image. Give your answer in bytes.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(c) The photographer decides to purchase a solid‑state storage device to back up their images.
Some of the terms in the list will not be used. You should only use a term once.
........................................................... .
Gates are used to control the flow of the ........................................................... through the
...................................................................................................................................................
............................................................................................................................................. [1]
The structure of a packet of data has three elements. One element is the packet header.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(b) Computer A needs to be directly connected to a router that is located in a different room.
(i) Tick (✓) one box to identify whether serial data transmission or parallel data transmission
is more suitable for this connection.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(i) The bytes need to be sent using an even parity byte check.
Parity
bit
Byte A 1 1 0 0 0 1 1
Byte B 0 0 0 0 0 0 0
[2]
(ii) A parity block check can be used instead of a parity byte check.
Explain how a parity block check might detect an error in transmission that would not be
detected by a parity byte check.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(iii) The data was sent using an even parity block check. One of the bits has been transmitted
incorrectly.
Parity
Bit 1 Bit 2 Bit 3 Bit 4 Bit 5 Bit 6 Bit 7
bit
Byte 0 1 1 1 0 1 0 0 0
Byte 1 0 0 1 0 0 1 0 0
Byte 2 1 0 1 1 0 0 0 1
Byte 3 1 1 0 0 1 1 1 1
Byte 4 1 0 1 0 0 0 1 0
Byte 5 0 0 0 0 0 0 0 0
Byte 6 0 1 1 1 1 0 0 0
Parity
0 1 1 0 1 0 1 0
byte
Identify the bit number and the byte number of the incorrect bit.
(d) The website allows the user to set up an account to log on and purchase items. The website
is accessed and displayed using a web browser.
(i) Two functions of the web browser are to render hypertext markup language (HTML) to
display web pages and to store cookies.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(ii) Identify two ways that cookies can be used to enhance the user’s experience of this
website.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
One of its robots is designed to make a specific movement depending on a binary value.
(a) The table gives some of the movements for the robot.
Complete the table by writing the missing binary, denary or hexadecimal value for each
movement.
[4]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
The robot will move forward continuously until it detects an object that is less than or equal to
10 cm in front of it.
If an object is less than or equal to 10 cm in front of it, the robot turns 90 degrees right. It then
tries to move forward again.
Explain how the sensor and the microprocessor are used to automate this robot.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [7]
(d) The robot needs to find its way through different puzzles. Each puzzle has a series of paths
that the robot needs to follow to find its way to the end of the puzzle. The puzzle contains
dead ends and obstacles, so the robot needs to decide which way to go.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
1(a) D 1
1(b) One mark for identification. E.g. One mark per bullet for description to max 6
two each.
Virus
• Software/code that replicates
• …when the user runs it // with an active host
• Deletes/damages/corrupts data/files // takes up storage/memory space
Worm
• Software/code that replicates itself on a network
• …without user input // without active host
• Takes-up bandwidth
• Deletes/damages/corrupts data/files // takes up storage/memory space
• Opens back doors to computers over the network
• Used to deposit other malware on networked computers
Trojan horse
• Software/code that is hidden within other software // Software that is
disguised as authentic software
• …when downloaded/installed the other malware/by example it
contains is installed
Adware
• Software/code that generates/displays (unwanted) adverts on a user's
computer
• Some may contain spyware/other malware
• Some when clicked may link to viruses
• Reduces device performance // reduces internet speed
• Redirects internet searches/user to fake websites
Ransomware
• Software/code that stops a user accessing/using their computer/data
• …by encrypting the data/files/computer
• A fee has to be paid to decrypt the data // A fee has to be paid to
'release' the computer/device/data
349
1(c) One mark for each similarity to max two. One mark for difference (both 3
sides needed unless clearly and accurately implied).
Similarities e.g.
• Check incoming and outgoing signals // filter traffic
• Store whitelist/blacklist
• Block incoming/outgoing signals
• Both block unauthorised access
• Keep a log of traffic
• Both can be hardware or software (or both)
Differences e.g.
• Proxy can hide user's IP address, firewall does not hide the user's IP
address
• Proxy intention is to divert attack from server, firewall is to stop
unauthorised access
• Proxy protects a server, firewall protects individual computer
• Proxy examines/processes requests for a website but a firewall does
not (checks type of signal) // Proxy processes client-side requests
whereas firewall filters packets
• Proxy transmits website data to the user, but a firewall does not (it
allows valid signals)
• Proxy allows faster access to a web page using cache, but a firewall
does not (allow faster access or have cache)
• Proxy can hide internal network from internet, but a firewall cannot
350
High-level
• Easier for programmer to read/write/understand/edit
• … therefore, the programmer is less likely to make mistakes // can write
in shorter timeframe
• Easier to debug // Easier to find/correct errors
• …so, the programmer can find and correct errors in less time
• Game will be machine independent // Game will be portable (between
hardware)
• …the game can be used on any computer without a need for
understanding of the hardware / compilation for that hardware
• Programmer can focus on the problem instead of the manipulation of
memory/hardware
Low-level
• More memory/RAM efficient
• … 3D graphics will have high memory consumption anyway
• Allows direct manipulation of memory
• … allows for more efficient control/response time
• Allows for use of specialised hardware
Compiler
• Checks all code before executing any code
• Produces error report with all errors found for the whole code (before
translating/running any of the code)
• Produces executable file
Interpreter
• Checks/translates one line of code and then executes it before moving
on to the next line
• Stops when an error is found
• … when corrected the program can be run from the same position //
allows error correction in real time
351
Pixel:
• One square/circle of one colour // the smallest component of the
image
Resolution:
• The number of pixels per set area/cm/inch // the number of pixels wide
by the number of pixels high // number of pixels in an image
Solid-state storage is non-volatile. This means that the data is not lost
when the power is turned off.
Solid-state storage is made of transistors that are laid out in a grid.
Gates are used to control the flow of the electrons through the transistors.
This changes the data in the transistors from 1 to 0, or from 0 to 1.
Serial
• Data arrives in order sent // does not need reordering
• Less likely to experience interference
• … less likely to have errors
• Can transmit over a longer distance (i.e. another room)
• Still fast transmission…
• …sufficient for this purpose
Parallel
• Faster transmission speed than serial
• … faster response to requests
• Very long connection not needed
• …next room is (likely) within distance for parallel
• … unlikely to error/arrive out of sequence/skew
0 1 1 0 0 0 1 1
0 0 0 0 0 0 0 0
Cambridge IGCSE™
* 2 8 3 1 0 1 3 0 1 6 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (LK/SG) 334324/4
© UCLES 2023 [Turn over
356
2
1 Tick (3) one box to show which word accurately describes the scope of a variable declared in a
procedure.
A Function
B Global
C Local
D Subroutine
[1]
Draw one line to link each description to its most appropriate pseudocode statement.
Not all pseudocode statements will be used.
a statement to start a
pre-condition loop Value Value + 1
[4]
(b) Write an algorithm in pseudocode, using a single loop, to output the average of 50 numbers
that have been stored in the array Number[]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
3 Describe the purpose of test data. Include an example of a type of test data in your answer.
Description .......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Example ...........................................................................................................................................
..........................................................................................................................................................
[3]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [3]
Complete the structure diagram for the given parts of the food ordering system.
[4]
6 The energy efficiency of an electrical appliance is the percentage of useful energy out compared with
the total energy in.
An algorithm has been written in pseudocode to calculate the energy efficiency of an appliance.
Values for total energy in and useful energy out are input. The efficiency is calculated and output
as a percentage.
The entry of the number –1 for either value stops the algorithm.
01 REPEAT
02 OUTPUT "Enter total energy in "
03 INPUT TotalEnergyIn
04 OUTPUT "Enter useful energy out "
05 OUTPUT UsefulEnergyOut
06 IF TotalEnergyIn <> -1 AND UsefulEnergy <> -1
07 THEN
08 Efficiency (UsefulEnergyOut / TotalEnergyIn) * 100
09 OUTPUT "Efficiency is ", Efficiency, "%"
10 ENDIF
11 UNTIL TotalEnergyIn <> -1 OR UsefulEnergyOut <> -1
(a) Identify the three errors in the pseudocode and suggest corrections.
Error 1 .......................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
Error 2 .......................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
Error 3 .......................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
[3]
(b) Write pseudocode to check for an efficiency of 92% or over for this appliance and to output
“A-rated” if the efficiency is 92% or over.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(a) Draw a logic circuit for this logic expression. Each logic gate must have a maximum of two
inputs. Do not simplify this logic expression.
B X
[5]
(b) Complete the truth table from the given logic expression.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
8 This flowchart represents an algorithm to find the average value of a number of sales.
START
NumberSales 0
Total 0
INPUT
SaleValue
IS Yes
SaleValue Average Total / NumberSales
= 0?
No OUTPUT
"Average sale
NumberSales NumberSales + 1 value ", Average
[4]
(b) Identify the error in the algorithm and describe how to correct it.
Error ..........................................................................................................................................
...................................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
A shop that sells books has set up a new database table called BookList to store book details.
Part of this table is given.
(a) State the number of records in this part of the database table.
............................................................................................................................................. [1]
(b) (i) Give the name of the field that would be used for the primary key.
..................................................................................................................................... [1]
(ii) State the reason for choosing this field for the primary key.
...........................................................................................................................................
..................................................................................................................................... [1]
(c) Complete the table to identify the most appropriate data type for each field based on the data
shown in the table BookList
CatNo
Title
Fiction
Price
[2]
(d) Write the output from this structured query language (SQL) statement.
FROM BookList
WHERE StockLevel = 0;
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(e) Complete this SQL statement to display all the titles by the author B Penn.
SELECT .....................................................................................................................................
FROM .........................................................................................................................................
WHERE .....................................................................................................................................;
[2]
10 The variables X, Y and Z are used in a program: X stores a whole number, Y stores a decimal
number and Z stores a flag that can be set to TRUE or FALSE
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) The function Same(A,B) returns TRUE if the value of A is the same as the value of B when B
is rounded to the nearest whole number and FALSE otherwise.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
...................................................................................................................................................
............................................................................................................................................. [1]
11 The one-dimensional (1D) array TeamName[] contains the names of teams in a sports league.
The two-dimensional (2D) array TeamPoints[] contains the points awarded for each match.
The position of each team’s data in the two arrays is the same. For example, the team stored at
index 10 in TeamName[] and TeamPoints[] is the same.
The variable LeagueSize contains the number of teams in the league. The variable MatchNo
contains the number of matches played. All teams have played the same number of matches.
The arrays and variables have already been set up and the data stored.
Each match can be played at home or away. Points are recorded for the match results of each
team with the following values:
• 3 – away win
• 2 – home win
• 1 – drawn match
• 0 – lost match.
You must use pseudocode or program code and add comments to explain how your code works.
You do not need to declare any arrays, variables or constants; you may assume that this has
already been done.
You do not need to initialise the data in the arrays TeamName[] and TeamPoints[] or the
variables LeagueSize and MatchNo
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
© UCLES 2023 0478/22/F/M/23 [Turn over
368
16
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................. [15]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
1 C 1
2(a) One mark for each single correct line from a description to statement 4
a statement to start a
post-condition loop REPEAT
370
Example: Total 0
FOR Count 1 TO 50
Total Total + Number[Count]
NEXT Count
Average Total / 50
OUTPUT "The average is ", Average
7(a) One mark for each correct gate, with the correct inputs as shown. 5
373
7(b) 4
A B C X
0 0 0 0
0 0 1 0
0 1 0 0
0 1 1 0
1 0 0 0
1 0 1 0
1 1 0 1
1 1 1 0
8(a) 4
NumberSales Total SaleValue Average OUTPUT
0 0
1 5.50 5.50
2 8.90 3.40
3 15.15 6.25
4 19.00 3.85
5 8.00 -11.00
9(a) 20 1
9(b)(i) CatNo 1
9(c) Two marks for 4 correct data types or one mark for 2 or 3 correct data types 2
Field Data type
CatNo Text/Alphanumeric
Title Text/alphanumeric
Fiction Boolean
Price Real
10(b) One mark for using FUNCTION and ENDFUNCTION and RETURNS BOOLEAN 6
One mark for naming the function Same
One mark for defining the two parameters correctly
One mark for comparing the two parameters using ROUND
One mark for correctly returning TRUE and FALSE
One mark for correct function call
Example definition:
FUNCTION Same(A : INTEGER, B : REAL) RETURNS BOOLEAN
IF A = ROUND(B,0)
THEN
RETURN TRUE
ELSE
RETURN FALSE
ENDIF
ENDFUNCTION
Example call:
Z Same(X,Y)
11 Read and understand the question before starting to mark any scripts. Read the whole answer before marking a script: 15
Check if each requirement listed below has been met.
Requirements may be met using a suitable built-in function from the programming language used (Python, VB.NET or
Java)
On script if requirement met add seen, NE if partial attempt, cross if no attempt (see marked scripts).
Use the tables for A02 and A03 below to award a mark in a suitable band using a best fit approach, then add up the total.
Marks are available for: to
• AO2 (maximum 9 marks)
• AO3 (maximum 6 marks)
Requirements (techniques)
R1 calculates total points for all matches played by each team (nested iteration, totalling)
R2 counts and outputs, with the team’s name, for each team
the total number of away wins, home wins, drawn matches and lost matches
(nested iteration, counting, output)
R3 finds and outputs
the name of the team with the highest number of points and the name of the team with the lowest number of points.
(output, selection)
378
NEXT TeamCounter
// output names of the teams with the highest and lowest number of points
OUTPUT "Top Team ", TeamName[TopTeam]
OUTPUT "Bottom Team ", TeamName[BottomTeam]
380
Cambridge IGCSE™
* 9 1 5 0 6 4 5 6 9 9 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (LK) 314033/2
© UCLES 2023 [Turn over
381
2
(a) Tick (3) one box to show which cyber security threat is not a type of malware.
A Phishing
B Ransomware
C Virus
D Worm
[1]
(b) Identify one other example of malware than those given in part 1(a).
............................................................................................................................................. [1]
(c) Identify the type of software that is used to find and remove malware from a computer.
............................................................................................................................................. [1]
1 1 1 0 0 0 1 1
(a) Give the denary number for the binary number stored in the register.
............................................................................................................................................. [1]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(b) Give the hexadecimal number for the binary number stored in the register.
............................................................................................................................................. [2]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(c) A logical left shift of two places is performed on the binary number stored in the register.
Complete the binary register to show its contents after this logical left shift.
[1]
(d) The negative denary number −99 needs to be stored in the register.
Complete the register to show the binary number that would be stored, using two’s
complement. Show all your working.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Register:
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
3 A user’s computer has a central processing unit (CPU) that has a clock speed of 2 GHz.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Explain the effect this change will have on the performance of the CPU.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) The CPU has a list of all the machine code commands it can process.
............................................................................................................................................. [1]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
freezer laptop
5 A band is recording their new song. They need to consider the sample rate and sample resolution
of their recording.
(a) Give one benefit of using a higher sample rate to record the song.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) Give one drawback of using a higher sample rate to record the song.
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(d) The band wants to compress the sound file, but they do not want any data to be permanently
removed.
............................................................................................................................................. [1]
Complete the table by identifying which data transmission methods are described.
[4]
7 A train station has a ticket inspector who checks each customer’s ticket before they are allowed to
get on the train.
The train station wants a system that will allow the tickets to be automatically checked.
(a) Identify two suitable input devices that can be used to automatically read the tickets.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) The train driver pushes a button to close the train door when all passengers have boarded
the train. The train door will only close when there are no passengers in the doorway.
The system to check there are no passengers in the doorway uses a sensor and a
microprocessor.
Explain how the sensor and the microprocessor are used to check whether the train door can
be closed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
8 (a) Draw and annotate a diagram that demonstrates the cyber security threat of data interception.
[4]
(b) Identify one security solution that will help keep data safe from data interception and state
why it will help keep the data safe.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
© UCLES 2023 0478/12/O/N/23
388
9
Term Description
.................................................. the collective name for all the web pages available
a small text file, stored by the web browser, that can store
..................................................
a user’s personal data
...........................................................................................
...........................................................................................
...........................................................................................
...........................................................................................
[6]
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) Explain one disadvantage to the company owner of using an automated system in
manufacturing.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Identify the process that uses a digital ledger to track the use of digital currency.
............................................................................................................................................. [1]
(i) Tick (3) one box to show which is an example of primary storage.
..................................................................................................................................... [1]
Some of the terms in the list will not be used. Some terms may be used more than once.
...................................................................... to the
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
1(a) − A 1
1(c) − Anti-malware 1
2(a) − 227 1
2(b) One mark for each correct character in the correct order: 2
− E3
2(c) 1
1 0 0 0 1 1 0 0
2(d) One mark for suitable working method e.g. flip and add 1 2
One mark for correct answer
− 10011101
1
1 1 1 0 0 0 1 1
+ 0 1 0 0 1 1 0 0
1 0 0 1 0 1 1 1 1
5(d) − Lossless 1
394
8(a) The diagram demonstrates (One mark for each part of the diagram): 4
− Data is being sent from one device to another
− The data is being examined during transmission
− Packet sniffer is used
− Intercepted data is reported to a third-party during transmission …
− … and analysed for anything useful
− Connection hacked to spoof destination address
e.g.
8(b) − Encryption … 2
− … if the data is intercepted it will be meaningless (because they do not
have the decryption key)
396
9 6
Term Description
− Utility/maintenance/repair costs
− … increase in bills such as electricity // skilled employees will be required
to maintain the system // equipment will break/need updating
12(b) − Blockchain 1
398
13(a)(i) − C 1
13(b) One mark for each correct term in the correct order: 5
− Random access memory (RAM)
− Hard disk drive (HDD)
− Pages
− Random access memory (RAM)
− Virtual memory // Hard disk drive (HDD)
399
Cambridge IGCSE™
* 3 4 3 5 3 7 0 0 4 3 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (RW/SG) 314039/4
© UCLES 2023 [Turn over
400
2
B is an integer.
C is correct.
D is not a string.
[1]
2 A type of validation check is a length check. Another type of validation check is used to make sure
that any date entered is in the dd/mm/yyyy style:
dd means day, mm means month and yyyy means year.
............................................................................................................................................. [1]
(b) Give one example of normal test data and one example of abnormal test data you should
use to make sure the check in part (a) is working properly.
Normal ......................................................................................................................................
Reason .....................................................................................................................................
...................................................................................................................................................
Abnormal ..................................................................................................................................
Reason .....................................................................................................................................
...................................................................................................................................................
[4]
(c) Describe how a length check could be used with the date entered.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(a) Draw one line to link each pseudocode statement to the most appropriate pseudocode use.
finding an average
Value (A1 + A2 + A3) / 3
totalling
Loop1 Loop1 + 1
using a conditional statement
Write a pseudocode algorithm using a single loop to find the lowest value in this array and
output the result only once.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
© UCLES 2023 0478/22/O/N/23 [Turn over
402
4
4 An algorithm has been written in pseudocode to allow the names of 50 cities and their countries to
be entered and stored in a two‑dimensional (2D) array. The contents of the array are then output.
(a) Identify the four errors in the pseudocode and suggest corrections.
Error 1 .......................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
Error 2 .......................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
Error 3 .......................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
Error 4 .......................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
[4]
(b) Describe the changes you should make to the corrected algorithm to allow the name of a
country to be input and to display only the stored cities from that country.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
5 Explain how variables and constants should be used when creating and running a program.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [3]
6 The flowchart represents an algorithm that performs a process on groups of values that are input.
The algorithm will fail if the first value of any group is 0.
START
Total 0
OUTPUT
"Average is ",
Average
Count 0
INPUT OUTPUT
Value "Total is ",
Total
IS Yes
Value = Average Total / Count
0 ?
No
IS Yes
Value = STOP
–1 ?
No
Count Count + 1
[5]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
7 The string operation SUBSTRING(Quote, Start, Number) returns a string from Quote
beginning at position Start that is Number characters long. The first character in Quote is in
position 1.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [5]
8 Explain why a programmer would use procedures and parameters when writing a program.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
B Z
[4]
(b) Complete the truth table from the given logic expression.
Working space
A B C Z
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
10 A database table called Horses stores details about the horses kept at a horse sanctuary.
............................................................................................................................................. [1]
(b) Give the name of the field that is most suitable to be the primary key.
Field ..........................................................................................................................................
Reason .....................................................................................................................................
...................................................................................................................................................
[2]
Complete the table to show the most appropriate data type for each field.
Each data type must be different.
Gender
Age
Arrived
[2]
(d) Complete the structured query language (SQL) to return the code and breed of all the horses
whose breed originated in Scotland.
FROM .........................................
11 A wood flooring company stores the names of up to 100 customers in a one‑dimensional (1D) array
Customers[]. A two‑dimensional (2D) array Quotations[] stores details of each customer’s
quotation:
• length of room (one decimal place)
• width of room (one decimal place)
• area of wood required (rounded up to next whole number)
• choice of wood index (whole number)
• price of wood required in dollars (two decimal places).
The floor measurements (room length and room width) are taken in metres. All floors are rectangles
and room measurements must be between 1.5 and 10.0 inclusive.
The index of any customer’s data is the same in both arrays. For example, a customer named in
index 4 of Customers[] corresponds to the data in index 4 of Quotations[]
The data are stored in two 1D arrays named WoodType[] and Price[]. The index of the wood
type and price in their arrays share the same index number.
You must use pseudocode or program code and add comments to explain how your code works.
You do not need to declare any arrays or variables; you may assume that this has already been
done.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
© UCLES 2023 0478/22/O/N/23
411
13
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
© UCLES 2023 0478/22/O/N/23 [Turn over
412
14
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................. [15]
1 A 1
2(b) One mark for each appropriate test data, max two 4
One mark for each correct accompanying reason, max two
For example:
Normal – 30/12/1960 …
Reason – … (the date is written in the correct format and) should be
accepted.
Abnormal – 30/Dec/1960 …
Reason – … (the month is not written in the correct format and) should be
rejected.
Example answer:
Min 100
FOR Count 1 TO 25
IF Temperatures[Count] < Min
THEN
Min Temperatures[Count]
ENDIF
NEXT Count
OUTPUT "The lowest temperature is ", Min
Correct algorithm:
01 DECLARE City : ARRAY[1:50, 1:2] OF STRING
02 DECLARE Count : INTEGER
03 DECLARE Out : INTEGER
04 Count 1
05 REPEAT
06 OUTPUT "Enter the name of the city"
07 INPUT City[Count, 1]
08 OUTPUT "Enter the name of the country"
09 INPUT City[Count, 2]
10 Count Count + 1
11 UNTIL Count > 50
12 FOR Out 1 TO 50
13 OUTPUT "The city ", City[Out, 1], " is in ",
City[Out, 2]
14 NEXT Out
415
0 0
25 25 1
35 60 2
3 63 3
0 21 Total is 63
Average is 21
0 0
57 57 1
20 77 2
25 102 3
18 120 4
0 30 Total is 120
Average is 30
0 0
−1
For example:
Quote "Learning Never Exhausts The Mind"
Start 25
Number 8
OUTPUT SUBSTRING(Quote, Start, Number)
OUTPUT LCASE(Quote)
9(a) One mark for each correct gate, with the correct input(s) as shown. 4
A B C Z
0 0 0 1
0 0 1 1
0 1 0 1
0 1 1 1
1 0 0 1
1 0 1 1
1 1 0 0
1 1 1 1
419
10(a) 18 1
For example:
Code …
…Each entry in this field is a unique identifier
Breed text
Gender Boolean
Age integer
Arrived date/time
SELECT
Horses
BreedOrigin
Correct SQL:
Tables for AO2 and AO3 are used to award a mark in a suitable band using a
best fit approach.
Requirements (techniques)
R1 Input and store customer name, room length and width, with validation of
input for room dimensions, including error message and repeated input
(Input with prompts, range check and iteration).
R2 Initialise wood arrays. Calculate room area, select and store wood
required. Determine cost of wood type and calculate price of wood to
purchase. Round and store all data to relevant array (array initialisation,
rounding, data retrieval from array, calculation and storage of results).
R3 Output full details: name of customer, choice of wood and quotation price
with appropriate messages. Program continues for next customer (Output
with messages, iteration of whole program).
421
11 Price[Count]
Next Count
// input wood choice
OUTPUT "Input a number from 1 to 3 "
INPUT WoodChoice
// validate wood choice
WHILE WoodChoice < 1 OR WoodChoice > 3
OUTPUT "Your input is out of range, please try
again "
INPUT WoodChoice
ENDWHILE
// to calculate the total cost of the wood
WoodCost RoomArea * Price[WoodChoice]
// to store the relevant data in Quotations[]
Quotations[CurrentCustomer, 1] RoomLength
Quotations[CurrentCustomer, 2] RoomWidth
Quotations[CurrentCustomer, 3] RoomArea
Quotations[CurrentCustomer, 4] WoodChoice
Quotations[CurrentCustomer, 5] WoodCost
Cambridge IGCSE™
* 5 0 1 5 4 0 7 3 5 7 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (DE) 327909/3
© UCLES 2024 [Turn over
424
2
(a) Tick (✓) one box to show the reason why computers use binary to represent data.
B Computers are made of switches and gates that can only be on or off.
C Binary does not need to be converted into other forms of data to be displayed.
The American standard code for information interchange (ASCII) denary number for the
character ‘N’ is 78.
(i) Tick (✓) one box to identify the ASCII denary number for the character ‘Q’.
A 81
B 80
C 79
D 77
[1]
(ii) Give the binary number for the ASCII denary number for ‘N’.
..................................................................................................................................... [1]
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(iii) Explain how the word ‘RED’ is represented using a character set.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
© UCLES 2024 0478/12/F/M/24
425
3
(i) Explain why recording sound with a higher sampling resolution creates a more accurate
recording.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Give one other way that the accuracy of a sound recording can be improved.
...........................................................................................................................................
..................................................................................................................................... [1]
(a) The table contains five statements about the role of registers in the fetch–decode–execute
cycle of a CPU.
Letter Statement
A PC stores the address of the next instruction to be accessed
B MAR stores the instructions of the program that is running
C MDR stores the data passed to it from the PC
D ACC stores the result of each calculation
E CIR stores the instruction currently being executed
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(b) The computer has a single core 3.5 GHz processor and an 8 kB cache.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Read only memory (ROM) is another example of primary storage. ROM often stores the
start-up instructions for a computer.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
..................................................................................................................................... [1]
(a) Complete the table by writing each missing OS function name and description.
……………………………………………………………………………
……………………………………………………………………………
managing memory
……………………………………………………………………………
……………………………………………………………………………
……………………................…
allows application software to run on the computer
……………………................…
……………………………………………………………………………
……………………………………………………………………………
managing peripherals
……………………………………………………………………………
……………………………………………………………………………
[3]
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Identify one input device and one example of an interrupt that it can generate.
Interrupt .............................................................................................................................
[1]
Explain how the processor manages the current program and the interrupt.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
4 A student enters a uniform resource locator (URL) into their web browser.
Draw and annotate a diagram to show the process from the user entering the URL to the web
browser displaying the web page.
[5]
transaction-chains virtually
electronically.
These are decentralised databases where each transaction is stored as a new set of data with
a ........................................................... and is linked to the previous set of data. This means that
transactions cannot be altered, only new transactions added, which allows the location of the data
to be ........................................................... .
[4]
6 A self-driving tractor sows seeds and harvests crops for a farmer. The self-driving tractor moves
automatically through the field, turning at each end and stopping when it has finished.
(a) One reason the self-driving tractor is a robot is because it has a mechanical structure that
includes wheels, an engine, and a framework.
Give one other reason why the self-driving tractor is an example of a robot.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) If a person is detected within 3 metres whilst the tractor is moving, the self-driving tractor
must stop.
(i) Explain how an infra-red sensor, microprocessor and actuator can be used to stop the
self-driving tractor if a person is detected within 3 metres.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
(ii) Identify one other sensor that the self-driving tractor might use and how it will use the
sensor.
Sensor ...............................................................................................................................
Use ....................................................................................................................................
...........................................................................................................................................
[2]
(c) Explain the drawbacks of a farmer using a self-driving tractor to sow seeds and harvest crops.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(d) The self-driving tractor has an in-built expert system that the farmer can use to solve any
errors with the tractor.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(e) At the end of each day the self-driving tractor transmits the data it has collected to the farmer’s
computer in their house.
(i) Describe the role of the self-driving tractor and the farmer’s computer in the echo check.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
The table shows 7 bytes that are transmitted using odd parity. The parity bit has been
completed for each byte.
parity
bit 7 bit 6 bit 5 bit 4 bit 3 bit 2 bit 1
bit
byte 1 1 1 0 0 1 1 1 0
byte 2 1 0 0 0 0 1 1 0
byte 3 0 1 0 0 0 0 0 0
byte 4 0 1 0 0 1 1 1 1
byte 5 1 0 0 0 0 0 0 0
byte 6 0 1 1 1 1 1 1 1
byte 7 1 1 0 0 1 1 0 1
parity
byte
[3]
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
..................................................................................................................................... [1]
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(ii) Give one benefit of using hexadecimal instead of binary to represent data.
...........................................................................................................................................
..................................................................................................................................... [1]
(b) Two’s complement can be used to represent positive and negative binary integers.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Convert the denary number 45 into an 8-bit two’s complement integer.
...........................................................................................................................................
..................................................................................................................................... [1]
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
State the mathematical effect of a right shift of four places on a positive binary integer.
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Note: No marks are awarded for using brand names of software packages or hardware.
1(a) B 1
1(b)(i) A 1
1(b)(ii) 01001110 1
2(a) One mark for letter and One mark for matching correction. 4
• Statement B …
• …MAR stores addresses and not instructions
• Statement C …
• …Data is from bus not PC //
Data is from address in MAR not PC
2(b)(i) It can run 3.5 billion FE cycles each second // it can execute 3.5 billion instructions each second 1
Examples:
managing memory • allocates memory to processes
• prevents two processes accessing the same memory
Examples:
• allocates data to buffers
managing peripherals
• transmits data to hardware
• receives data from hardware
1. URL
DNS
Student's
computer 3. IP URLs IP
…..co.uk 250.256..
…..co.uk 058.51..
Web server
5. Process request
443
A digital currency does not exist physically, it can only be accessed electronically.
Some digital currencies have digital ledgers called a blockchains. These are decentralised databases where each
transaction is stored as a new set of data with a time-stamp and is linked to the previous set of data. This means that
transactions cannot be altered, only new transactions added, which allows the location of the data to be traced.
6(b)(ii) One mark for sensor and One mark for matching use: 2
e.g.
• Accelerometer …
• …to adjust for uneven ground // to detect if the tractor crashes
• Proximity …
• …to detect if near the end of the field // to detect other obstacles
• Light …
• … to identify when to turn the headlights on
parity
bit 7 bit 6 bit 5 bit 4 bit 3 bit 2 bit 1
bit
byte 1 1 1 0 0 1 1 1 0
byte 2 1 0 0 0 0 1 1 0
byte 3 0 1 0 0 0 0 0 0
byte 4 0 1 0 0 1 1 1 1
byte 5 1 0 0 0 0 0 0 0
byte 6 0 1 1 1 1 1 1 1
byte 7 1 1 0 0 1 1 0 1
parity
byte 1 0 0 0 1 0 1 0
446
8(a)(i) EC 1
8(b)(ii) 00101101 1
Cambridge IGCSE™
* 8 4 7 2 5 2 9 9 3 1 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (DE/JG) 327910/4
© UCLES 2024 [Turn over
449
2
1 Tick (✓) one box to show which task is part of the analysis stage of the program life cycle.
A coding
B decomposition
C design
D testing
[1]
2 (a) Four test data types and five descriptions are shown.
Draw one line to link each test data type to its most appropriate description.
extreme
a value that is rejected
(b) An algorithm has been written to test if an integer that is input is in the range 5 to 10 inclusive.
Identify an example of suitable test data for each test data type.
Abnormal ..................................................................................................................................
...................................................................................................................................................
Boundary ..................................................................................................................................
...................................................................................................................................................
Extreme ....................................................................................................................................
...................................................................................................................................................
Normal ......................................................................................................................................
...................................................................................................................................................
[4]
(a) Write an algorithm in pseudocode to input a number, MyNumber, and use a linear search to
test if that number is stored in the array. If the number is found in the array, the position in the
array is output. If the number is not found in the array, “Not found” is output.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Write an algorithm in pseudocode to sort the array Values[1:50] into ascending order
using a bubble sort.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
1 .......................................................................................................................................................
2 .......................................................................................................................................................
3 .......................................................................................................................................................
[3]
5 An algorithm has been written in pseudocode to calculate the profit when an item is sold. Values
for cost price and selling price are input, the profit is calculated (selling price – cost price) and
output. The input of zero for either value stops the algorithm.
01 REPEAT
02 OUTPUT "Enter cost price "
03 INPUT Cost
04 OUTPUT "Enter selling price "
05 OUTPUT Sell
06 IF Cost <> 0 OR Sell <> 0
07 THEN
08 Profit Sell - Cost ←
09 OUTPUT "Profit is ", Profit
10 NEXT
11 UNTIL Cost = 0 OR Sell = 0
(a) Identify the line numbers of three errors in the pseudocode and suggest corrections.
Correction .................................................................................................................................
...................................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
[3]
(i) Write pseudocode to reject the input of values less than zero for variables Cost and
Sell
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(ii) Describe two other validation checks that should be included in this algorithm.
Check 1 .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Check 2 .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
6 Describe two types of iteration that a programmer can use whilst writing a program.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
(a) Draw a logic circuit for this logic expression. Each logic gate must have a maximum of two
inputs. Do not simplify this logic expression.
B X
[4]
(b) Complete the truth table from the given logic expression.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
8 This flowchart represents an algorithm to find the average size of groups of visitors to an attraction.
START
NumberGroups 0
Total 0
INPUT
GroupSize
IS Yes
GroupSize Average DIV(Total, NumberGroups)
= 0?
No OUTPUT
"Average group
NumberGroups NumberGroups + 1 size ", Average
7, 10, 2, 8, 3, 9, 0, 6
[4]
9 A storage unit rental company wants to set up a new database table for the storage units that can
be rented.
(a) (i) Give the name of the field that would be used for the primary key.
..................................................................................................................................... [1]
(ii) State the reason for choosing this field for the primary key.
...........................................................................................................................................
..................................................................................................................................... [1]
(b) Complete the table to identify the most appropriate data type for these fields in the table
StorageUnits
(c) Complete this structured query language (SQL) statement to display only the storage code,
price and size in square metres of all the storage units where there is a hoist available.
SELECT ....................................................................................................................................
FROM ........................................................................................................................................
WHERE ................................................................................................................................... ;
[4]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
11 Students in a class are recording the amount of time in minutes spent in front of a screen for each
day of the week.
The one-dimensional (1D) array StudentName[] contains the names of the students in the class.
The two-dimensional (2D) array ScreenTime[] is used to input the number of minutes on each
day spent in front of a screen.
The position of each student’s data in the two arrays is the same. For example, the student stored
at index 10 in StudentName[] and ScreenTime[] is the same.
You must use pseudocode or program code and add comments to explain how your code works.
All inputs and outputs must contain suitable messages.
Assume that the array StudentName[] and the variable ClassSize already contain the
required data.
You do not need to declare any arrays or variables; you may assume that this has already been
done.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
© UCLES 2024 0478/22/F/M/24
460
15
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
© UCLES 2024 0478/22/F/M/24 [Turn over
461
16
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
................................................................................................................................................... [15]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
1 B 1
2(a) One mark for each correct line from the test data type the description 4
extreme
a value that is rejected
normal
a value that is the highest or lowest value to be accepted
Example:
INPUT MyNumber
Location 0
FOR Index 1 TO 50
IF Values[Index] = MyNumber
THEN
Location Index
ENDIF
NEXT Index
IF Location = 0
THEN
OUTPUT "Not found"
ELSE
OUTPUT Location
ENDIF
464
Last 50
Repeat
Swap FALSE
FOR Index 1 TO Last - 1
IF Values[Index] > Values[Index + 1]
THEN
Temp Values[Index]
Values[Index] Values[Index + 1]
Values[Index + 1] Temp
Swap TRUE
ENDIF
NEXT
Last Last - 1
UNTIL NOT Swap or Last = 1
Example:
REPEAT
OUTPUT "Enter cost price "
INPUT Cost
UNTIL Cost >= 0
REPEAT
OUTPUT "Enter selling price "
INPUT Sell
UNTIL Sell >= 0
or
5(b)(ii) One mark for identifying validation check and one mark for accompanying description max four 4
• presence check (1) to check that values have been input (1)
• type check (1) to check for numerical values (1)
6 One mark for identifying a type of iteration, one mark for accompanying description max four 4
• count controlled (1) number of iterations is pre-determined (1)
• pre-condition (1) checks condition at start of loop // loop may not iterate (1)
• post-condition (1) checks condition at end of loop // loop always iterates at least once (1)
7(a) One mark for each correct gate, with the correct input(s) as shown. 4
467
7(b) 4
A B C X
0 0 0 0
0 0 1 0
0 1 0 0
0 1 1 0
1 0 0 0
1 0 1 1
1 1 0 0
1 1 1 0
0 0
1 7 7
2 17 10
3 19 2
4 27 8
5 30 3
6 39 9
9(a)(i) StorageID 1
SizeMetres Real/Integer
Position Char/Integer/Text/Alphanumeric
Hoist Boolean/Text/Alphanumeric
StorageID Text/Alphanumeric
11 Check if each requirement listed below has been met. Requirements may be met using a suitable built-in function from the 15
programming language used (Python, VB.NET or Java).
On the script, add seen if the requirement has been met, NE if a partial attempt, or a cross if no attempt .
Use the tables for AO2 and AO3 below to award a mark in a suitable band using a best fit approach, then add up the total.
Marks are available for:
• AO2 (maximum 9 marks)
• AO3 (maximum 6 marks)
Requirements (techniques)
R1 allows a student to enter their weekly screen time and calculates the total number of minutes of screen time for each
student in the week (input, iteration and totalling)
R2 counts the number of days with more than 300 minutes screen time each day and calculates the average week’s
screen time for the whole class (selection, counting, iteration, calculating average)
R3 finds the student with the lowest weekly minutes. Outputs for each student: name, total week’s screen time in hours
and minutes, number of days with more than 300 minutes screen time, outputs the average weeks screen time for the
whole class and the name of the student with the lowest number of minutes (finding minimum value, output)
472
WeekLength 5
LowestMinutes 1000
ClassTotal 0
FOR StudentCounter 1 to ClassSize // loop for each student
Total 0
DaysOver300 0
FOR DayCounter 1 to WeekLength // loop for each day
REPEAT
OUTPUT "Please enter number of minutes for day ", DayCounter
INPUT Minutes
UNTIL Minutes >= 0
ScreenTime[StudentCounter, DayCounter] Minutes
Total Total + Minutes
IF Minutes > 300
THEN
DaysOver300 DaysOver300 + 1
ENDIF
IF Minutes < LowestMinutes
THEN
LowestMinutes Minutes
LowestIndex StudentCounter
ENDIF
NEXT DayCounter
OUTPUT StudentName[StudentCounter]
OUTPUT "Screen time ", DIV(Total, 60), " hours ", MOD(Total, 60), " minutes "
OUTPUT "Days with more than 300 minutes screen time ", DaysOver300
ClassTotal ClassTotal + Total
NEXT StudentCounter
OUTPUT "Average weekly screen time for class ", ClassTotal / ClassSize, " minutes "
OUTPUT "Lowest weekly time ", StudentNames[LowestIndex]
* 0019654976301 * 473
Cambridge IGCSE™
¬Wz> 3mG{M¡=iVW
¬a=¤IzUrsTa_
¥ eU5Ue5EUe¥ uU
* 8 4 8 6 8 9 2 6 8 8 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (KS) 329152/4
© UCLES 2024 [Turn over
* 0019654976302 * 474
(a) Give the name of the data storage measurement that is equal to 8 bits.
............................................................................................................................................. [1]
............................................................................................................................................. [1]
(c) Give the name of the data storage measurement that is equal to 1024 gibibytes (GiB).
(d) A 16-bit colour image has a resolution of 512 pixels wide by 512 pixels high.
Calculate the file size of the image in kibibytes (KiB). Show all your working.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(a) Tick (3) one box to show which of the terms is not a method for transmitting data.
B simplex
C parallel
D parity
[1]
(b) Data is broken down into smaller units to be transmitted from one device to another.
DO NOT WRITE IN THIS MARGIN
Give the name of the unit that data is broken down into.
............................................................................................................................................. [1]
ĬÕú¾Ġ³íÇûÍġ½ĞìĈØĎ×
© UCLES 2024 ĬĖěâÀĨ½ĐÞÿôĐĬößęçĂ
ĥÕµÕõµĥÕõÕąÕååĥÕÕÕ
0478/12/M/J/24
* 0019654976303 * 475
DO NOT WRITE IN THIS MARGIN
3
, ,
(c) Data is often encrypted when it is transmitted from one device to another.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
..................................................................................................................................... [1]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
Ĭ×ú¾Ġ³íÇûÍġ½ĞìĆØĎ×
© UCLES 2024 ĬĖĜáÈĢÁĠÛùýÙ°þûę×Ă
ĥÕÅĕµÕąµĥåÕÕåÅąĕÅÕ
0478/12/M/J/24 [Turn over
* 0019654976304 * 476
(a) Give the name of the number system that is base 16.
............................................................................................................................................. [1]
(b) Three denary numbers are entered into a computer. The computer converts the numbers and
stores them as binary.
(i) Give the binary number that would be stored for each of the denary numbers.
50 ......................................................................................................................................
201 ....................................................................................................................................
[3]
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(c) The two binary integers 00110000 and 01100110 are added together.
Add the binary integers using binary addition and show your answer in binary. Show all your
working.
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
ĬÕú¾Ġ³íÇûÍġ½ĞêĈØĐ×
© UCLES 2024 ĬĖĜäÈĬ³ĩà÷ĆÒĎâÙĉßĂ
ĥĥĕĕõÕąĕąąåÕĥÅåĕÕÕ
0478/12/M/J/24
* 0019654976305 * 477
DO NOT WRITE IN THIS MARGIN
5
, ,
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
............................................................................................................................................. [2]
4 A student uses both system software and application software on their computer.
............................................................................................................................................. [1]
DO NOT WRITE IN THIS MARGIN
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(c) Describe the difference between system software and application software.
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
DO NOT WRITE IN THIS MARGIN
Ĭ×ú¾Ġ³íÇûÍġ½ĞêĆØĐ×
© UCLES 2024 ĬĖěãÀЯęÙāûėÊÚýĉÏĂ
ĥĥĥÕµµĥõĕõõÕĥåÅÕÅÕ
0478/12/M/J/24 [Turn over
* 0019654976306 * 478
(a) Complete the paragraph about fetching an instruction into the CPU to be processed.
Some of the terms in the list will not be used. You should only use a term once.
...................................................................................................................................................
............................................................................................................................................. [1]
DO NOT WRITE IN THIS MARGIN
ĬÙú¾Ġ³íÇûÍġ½ĞëĆÕĎ×
© UCLES 2024 ĬĖĜãÃĨ×ēÑĆĊĞêâĠáßĂ
ĥµÅÕµĕĥÕÕĕÕÕååĥĕĕÕ
0478/12/M/J/24
* 0019654976407 * 479
DO NOT WRITE IN THIS MARGIN
7
, ,
Complete the table by giving the correct error detection method for each statement.
is transmitted.
7 A computer has both a media access control (MAC) address and an internet protocol (IP) address.
(a) Tick (3) one box to show which of the statements is correct about the MAC address.
B It is assigned by a router.
..................................................................................................................................... [1]
1 ........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
ĬÛù¿Ġ³íÇûÍġ½ĞìĆÕĎ×
© UCLES 2024 ĬĖĜáÀīèõâćöÙđĢĠđ×Ă
ĥąĥĕµµÅµµĕõÕĥĥĥÕåÕ
0478/12/M/J/24 [Turn over
* 0019654976408 * 480
8 A company has a website that is suffering a distributed denial of service (DDoS) attack.
(a) Draw and annotate a diagram to show the process of the DDoS.
(b) Identify a solution that can be used to help prevent the DDoS attack being successful.
............................................................................................................................................. [1]
ĬÙù¿Ġ³íÇûÍġ½ĞêĈÕĐ×
© UCLES 2024 ĬĖĜäÀġÖôÕĉíÒ³¾¾āßĂ
ĥµµĕõµÅĕÕµąÕåĥÅÕµÕ
0478/12/M/J/24
* 0019654976409 * 481
DO NOT WRITE IN THIS MARGIN
9
, ,
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
DO NOT WRITE IN THIS MARGIN
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
[6]
DO NOT WRITE IN THIS MARGIN
ĬÛù¿Ġ³íÇûÍġ½ĞêĆÕĐ×
© UCLES 2024 ĬĖěãÈħÚĄäïĄėħ¶ĚāÏĂ
ĥµÅÕµÕåõÅÅÕÕåąåĕåÕ
0478/12/M/J/24 [Turn over
* 0019654976410 * 482
10 A garage uses an expert system to help diagnose any problems with cars that need repair.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(b) A car has a problem with its braking system, so it is brought into the garage.
Explain how the expert system operates and how it is used to help diagnose the problem.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
ĬÙù¿Ġ³íÇûÍġ½ĞëĈ×Ď×
© UCLES 2024 ĬĖęäÅģÎĦÛĂöüÏÀê¹×Ă
ĥĥÕÕõµĥĕõąąĕåÅÅÕąÕ
0478/12/M/J/24
* 0019654976411 * 483
DO NOT WRITE IN THIS MARGIN
11
, ,
11 A company has a website. Users use the internet and the world wide web to access the website.
(a) Describe the difference between the internet and the world wide web.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
DO NOT WRITE IN THIS MARGIN
(b) The website has a uniform resource locator (URL). The URL has three different parts.
Identify the three different parts that are included in the URL.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
DO NOT WRITE IN THIS MARGIN
(c) One function of a web browser is to provide an address bar for a user to enter a URL.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
ĬÛù¿Ġ³íÇûÍġ½ĞëĆ×Ď×
© UCLES 2024 ĬĖĚã½ĥÒĖÞøċċ¸î¹çĂ
ĥĥåĕµÕąõĥõÕĕåååĕĕÕ
0478/12/M/J/24
0478/12 Cambridge IGCSE – Mark Scheme 484
May/June 2024
PUBLISHED
Question Answer Marks
1(b) 8192 1
1(d) One mark for each correct stage of working (max 2): 3
512 512
262 144 * 2 // multiplied by 16 and divided by 8
524 288/1024
512 (KiB)
2(a) D 1
2(b) Packet 1
2(c)(i) Data is encrypted and decrypted using the same key (1 mark) 4
Any three from:
Plain text is encrypted into cipher text // cipher text is decrypted into plain text
Data is encrypted using an algorithm …
… that uses a key
The key can be generated using an algorithm
The key is transmitted to the receiver
3(a) Hexadecimal 1
3(b)(i) 1010 3
110010
11001001
1 1
0 0 1 1 0 0 0 0
0 1 1 0 0 1 1 0
1 0 0 1 0 1 1 0
5(a) One mark for each correct term in the correct place: 7
address
memory address register // MAR
random access memory // RAM
memory data register // MDR
data
current instruction register // CIR
control unit // CU
5(b) A list of (machine code) commands that can be processed by the CPU 1
7(a) A 1
7(b)(i) An IP address that has numerical values separated by dots that follows the format with a max value of 255 in any xxx 1
xxx.xxx.xxx.xxx
Example: 10.245.3.99
8(a) One mark for each part of the diagram that shows: 5
A perpetrator/third party sending malware // user downloads/installs malware
Each computer is turned into a bot…
… to create a botnet
Third party initiates the attack
All the bots send a request at once to a web server
… crashing the webserver
Example:
Botnet
bot
bot
third web
party Requests server
bot
Third party
sends
Web server
malware.
bot cannot handle
all the requests
and crashes.
Malware turns
computers
into bots.
Solid-state stores data onto silicon chips/transistors using logic (floating/control/NAND/NOR) gates to control the
movement of electrons
… optical stores data by using lasers to burning pits and lands onto a disk
11(b) Protocol 3
Domain name
File name // web page name
, ,
Cambridge IGCSE™
¬O. 3mKo[U¢8¦6W
¬`I£0£]v§¦Lb:V
¥U 5¥5U5¥ Eu5U
* 4 5 6 7 6 0 4 2 2 6 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (LK/CB) 329121/3
© UCLES 2024 [Turn over
* 0019655533402 * 494
1 Tick (✓) one box to identify a method used to design and construct a solution to a computing
problem.
A analysis
B coding
C flowchart
D testing
[1]
Draw one line to link each logic function to its standard symbol. Not all standard symbols will be
used.
AND
NAND
OR
3 Identify three different tasks in the analysis stage of the program development life cycle.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
[3]
ĬÍĊ®Ġ³íËïÛđÕ̵Ĩ¸Ď×
© UCLES 2024 ĬėěßÌħ¼ąÖċôČβĒĂÎĂ
ĥąĕĕõõåÕĥÕĥåąÅåµĕÕ
0478/22/M/J/24
* 0019655533403 * 495
DO NOT WRITE IN THIS MARGIN
3
, ,
4 A program needs to make sure the characters input for a product code meet these rules:
(a) Identify three validation checks and state how each check would make sure the product code
met one of these rules.
Check 1 ....................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
Check 2 ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Check 3 ....................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
[6]
(b) The program design will include a pseudocode algorithm. Assume that the product code is
stored in the variable Product
(i) Write the pseudocode to make sure that the product code is six characters in length.
...........................................................................................................................................
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Write the pseudocode to make sure that the first two characters of the product code are
“PD”.
...........................................................................................................................................
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
ĬÏĊ®Ġ³íËïÛđÕ̵Ħ¸Ď×
© UCLES 2024 ĬėĜàÄġ¸õãíý½ĊÊÆĂÞĂ
ĥąĥÕµĕŵõåµåąåÅõąÕ
0478/22/M/J/24 [Turn over
* 0019655533404 * 496
5 A high-level programming language makes use of arithmetic, Boolean and logical operators.
Arithmetic .........................................................................................................................................
..........................................................................................................................................................
Example ...........................................................................................................................................
Boolean ............................................................................................................................................
..........................................................................................................................................................
Example ............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Example ...........................................................................................................................................
..........................................................................................................................................................
[6]
ĬÍĊ®Ġ³íËïÛđÕĢ·Ĩ¸Đ×
© UCLES 2024 ĬėĜÝÄīÆôØóĆÆìĦĨĒÖĂ
ĥµµÕõĕÅĕĕąÅåÅåĥõĕÕ
0478/22/M/J/24
* 0019655533405 * 497
DO NOT WRITE IN THIS MARGIN
5
, ,
Numbers are input. The number 9999.9 is the last number to be input and is ignored.
(a) Write an algorithm in pseudocode to total the numbers input and to output the total.
You do not need to validate the input.
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
............................................................................................................................................. [4]
(b) Write an algorithm in pseudocode to count and output the number of input values that are
greater than 100. You do not need to validate the input.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
DO NOT WRITE IN THIS MARGIN
ĬÏĊ®Ġ³íËïÛđÕĢ·Ħ¸Đ×
© UCLES 2024 ĬėěÞÌĝÊĄáąûăðĎ´ĒæĂ
ĥµÅĕµõåõąõĕåÅÅąµąÕ
0478/22/M/J/24 [Turn over
* 0019655533406 * 498
7 An algorithm has been written in pseudocode to find and display the maximum and minimum
values in an array of 1000 positive numbers. The array List[] starts at index 1
01 Max List[1]
02 Min List[1]
03 FOR Counter 2 TO 1000
04 IF List[Counter] < Max
05 THEN
06 Max List[Counter]
07 ENDIF
08 IF List[Count] ˂ Min
(b) Identify the line numbers of the three errors in the pseudocode and suggest a correction for
each error.
Correction .................................................................................................................................
...................................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
Correction .................................................................................................................................
...................................................................................................................................................
[3]
DO NOT WRITE IN THIS MARGIN
ĬÑĊ®Ġ³íËïÛđÕ̶ĦµĎ×
© UCLES 2024 ĬėĜÞÇħâĊéĂĊúĐĦѺÖĂ
ĥĥĥĕµÕåÕÅĕµåąÅåõÕÕ
0478/22/M/J/24
* 0019655533407 * 499
DO NOT WRITE IN THIS MARGIN
7
, ,
8 A logic circuit is to be built to control the opening of a safe used to store money. There are two
keys, A and B, and a time switch C. The safe can only open if both keys are used and the time
switch is off.
not used 0
key A
used 1
not used 0
key B
DO NOT WRITE IN THIS MARGIN
used 1
switch off 0
time switch C
switch on 1
............................................................................................................................................. [3]
DO NOT WRITE IN THIS MARGIN
Working space
A B C X
0 0 0
0 0 1
DO NOT WRITE IN THIS MARGIN
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
DO NOT WRITE IN THIS MARGIN
1 1 1
[4]
ĬÓĊ®Ġ³íËïÛđÕ̶ĨµĎ×
© UCLES 2024 ĬėěÝ¿ġÞúÐø÷¯ÌĎąºæĂ
ĥĥĕÕõµÅµÕĥĥåąåŵÅÕ
0478/22/M/J/24 [Turn over
* 0019655533408 * 500
START
A FALSE
B 1
Yes
List[B] List[B + 1]
List[B + 1] T
A TRUE
No IS B =
5?
Yes
Yes IS A =
TRUE?
STOP
(a) The array List[1:5] used in the flowchart contains this data:
15 17 20 5 9
DO NOT WRITE IN THIS MARGIN
ĬÑĊ®Ġ³íËïÛđÕ̏ĦµĐ×
© UCLES 2024 Ĭėěà¿īÐïëúð¸Ī²çêÎĂ
ĥÕÅÕµµÅĕµÅĕåÅåĥµÕÕ
0478/22/M/J/24
* 0019655533509 * 501
DO NOT WRITE IN THIS MARGIN
9
, ,
Complete the trace table using the data given in the array.
[5]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
ĬÓĉ¯Ġ³íËïÛđÕĢ·ĦµĐ×
© UCLES 2024 ĬėěÞÄĨßęÜûĄăÑòçĚæĂ
ĥĥĥĕµĕĥõÕŵåąĥĥõĥÕ
0478/22/M/J/24 [Turn over
* 0019655533510 * 502
10 A television subscription service has a new database table named Contract to store details of
their subscribers’ contracts. The table contains these fields:
............................................................................................................................................. [1]
(b) Complete the table to identify the most appropriate data type for these fields in Contract
ContractNumber
Months
Sport
[2]
(c) Explain the purpose of these structured query language (SQL) statements.
...................................................................................................................................................
...................................................................................................................................................
Statement 2 ..............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
DO NOT WRITE IN THIS MARGIN
ĬÑĉ¯Ġ³íËïÛđÕ̶Ĩ·Ď×
© UCLES 2024 ĬėęÝÁĤëïãĆöĠĩČėâÞĂ
ĥµõĕõõåĕĥąĥĥąåąµÅÕ
0478/22/M/J/24
* 0019655533511 * 503
DO NOT WRITE IN THIS MARGIN
11
, ,
(d) Complete this SQL statement to find the contract numbers of the subscribers that take both
the news and sports services.
SELECT .....................................................................................................................................
FROM Contract
ĬÓĉ¯Ġ³íËïÛđÕ̶Ħ·Ď×
© UCLES 2024 ĬėĚÞÉĦçÿÖôċéôÃâÎĂ
ĥµąÕµĕÅõõõµĥąÅĥõÕÕ
0478/22/M/J/24 [Turn over
* 0019655533512 * 504
11 A one-player game uses the two-dimensional (2D) array Grid[] to store the location of a secret
cell to be found by the player in 10 moves. Each row and column has 5 cells.
Start
Grid[1,1]
• The program places an ‘X’ in a random cell (not in Grid[1,1]) and empties all the other
cells in the grid.
• The player starts at the top left of the grid.
• The player has 10 moves.
You must use pseudocode or program code and add comments to explain how your code works.
You do not need to declare any arrays or variables; you may assume that this has already been
done.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
ĬÑĉ¯Ġ³íËïÛđÕ̏Ĩ·Đ×
© UCLES 2024 ĬėĚßÉĠÕĊáîĄâďÐġ²æĂ
ĥąÕÕõĕÅÕĕÕÅĥÅÅÅõÅÕ
0478/22/M/J/24
* 0019655533513 * 505
DO NOT WRITE IN THIS MARGIN
13
, ,
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
ĬÓĉ¯Ġ³íËïÛđÕ̏Ħ·Đ×
© UCLES 2024 ĬėęàÁĪÙúØČíħËèµ²ÖĂ
ĥąåĕµõåµąåĕĥÅååµÕÕ
0478/22/M/J/24 [Turn over
* 0019655533514 * 506
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................. [15]
ĬÍĉ¯Ġ³íËïÛđÕĢ·ĥ¶Ē×
© UCLES 2024 ĬėĚÞÄĨæĂæþúÌħí±ĂÎĂ
ĥååÕõĕĥĕĥµĕåąĥąõąÕ
0478/22/M/J/24
0478/22 Cambridge IGCSE – Mark Scheme 507
May/June 2024
PUBLISHED
Question Answer Marks
1 C 1
AND
XOR
NAND
OR
4(b)(i) One mark for correct use of LENGTH operation, one mark for appropriate test 2
Example:
REPEAT
INPUT Product
UNTIL LENGTH(Product) = 6
4(b)(ii) One mark for correct use of SUBSTRING operation, one mark for appropriate test 2
Example:
REPEAT
INPUT Product
UNTIL SUBSTRING(Product, 1, 2) = "PD"
5 One mark for each description, one mark for each example 6
arithmetic – used in calculations (1) A B + C (1)
Boolean – used for operations with true or false values (1) IF B AND C (1)
logical – used in comparisons/conditional statements/selection statements (1) IF B > C (1)
Example:
Total 0
INPUT Value
WHILE Value <> 9999.9
Total Total + Value
INPUT Value
ENDWHILE
OUTPUT Total
Value 0
Total 0
REPEAT
Total Total + Value
INPUT Value
UNTIL Value = 9999.9
OUTPUT Total
Example:
Counter 0
INPUT Value
WHILE Value <> 9999.9
IF Value > 100
THEN
Counter Counter + 1
ENDIF
INPUT Value
ENDWHILE
OUTPUT Counter
7(a) 01//02//06//10 3
04(07) and/or 08
03(12)
01 Max List[1]
02 Min List[1]
03 FOR Counter 2 TO 1000
04 IF List[Counter] > Max
05 THEN
06 Max List[Counter]
07 ENDIF
08 IF List[Counter] < Min
09 THEN
10 Min List[Counter]
11 ENDIF
12 NEXT Counter
13 OUTPUT "Maximum value is ", Max
14 OUTPUT "Minimum value is ", Min
8(a) X= 1 mark 3
(A AND B) // A AND B 1 mark
AND NOT C 1 mark
A B C X
0 0 0 0
0 0 1 0
0 1 0 0
0 1 1 0
1 0 0 0
1 0 1 0
1 1 0 1
1 1 1 0
10(a) ContractNumber 1
ContractNumber text/alphanumeric
Months integer
EndDate date/time
Sport Boolean
10(d) ContractNumber 2
News AND Sport // Sport AND News
Example answer:
SELECT ContractNumber
FROM Contract
WHERE News // News = TRUE AND Sport // Sport = TRUE ;
Requirements (techniques)
R1 Set up game – generate random cell, clear all other cells in array, set player start position and start player moves
counter (iteration, use of arrays and library routines (round and random))
R2 Input and check move – is it valid? (input, output, iteration and selection)
R3 Decide outcome – has move found the X? If so, give appropriate output. If not increment counter and continue. If 10
moves exceeded, give appropriate output (use of arrays, iteration, selection and output).
// during game
WHILE NumberMoves < MaxMove AND NOT Win
MoveError FALSE
OUTPUT "Please enter your move, L – Left, R – Right, U – Up or D - Down"
INPUT UPPER(PlayerMove)
REPEAT
CASE OF PlayerMove
'L' : TempColumn PlayerColumn – 1
'R' : TempColumn PlayerColumn + 1
'U' : TempRow PlayerRow – 1
'D' : TempRow PlayerRow + 1
OTHERWISE MoveError TRUE
ENDCASE
IF NOT Win
THEN
OUTPUT "You Lose"
ENDIF