Computer Paper 1 Practice Paper
Computer Paper 1 Practice Paper
* 7 2 3 3 0 0 5 5 8 3 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (PQ) 303750/3
© UCLES 2022 [Turn over
2
(a) (i) Tick (3) to show which type of data is stored in an MP3 file.
Tick (3)
Video
Sound
Image
[1]
(ii) Tick (3) to show whether the MP3 file is a lossy compressed file or a lossless compressed
file or not a compressed file.
Tick (3)
2 A computer is designed using the Von Neumann model for a computer system.
(a) Data is fetched from primary storage into the CPU to be processed.
(i) State the name of the primary storage from where data is fetched.
..................................................................................................................................... [1]
(ii) The CPU performs a cycle to process data. Fetch is the first stage in this cycle.
State the names of the second and third stages in the cycle.
(iii) Identify two components within the CPU that are used in the fetch stage of the cycle.
Component 1 .....................................................................................................................
Component 2 .....................................................................................................................
[2]
3 Three types of storage media are magnetic, optical and solid state.
............................................................................................................................................. [1]
(b) Optical storage uses a laser to store and read data from a disk.
Explain how the laser is used to store and read data from the disk.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) A business is creating a new mobile device that has an SSD as secondary storage.
(i) Give three reasons why an SSD is the most suitable secondary storage for their mobile
device.
Reason 1 ...........................................................................................................................
...........................................................................................................................................
Reason 2 ...........................................................................................................................
...........................................................................................................................................
Reason 3 ...........................................................................................................................
...........................................................................................................................................
[3]
(ii) Identify two examples of software that can be stored on the SSD.
Example 1 .........................................................................................................................
Example 2 .........................................................................................................................
[2]
4 All data needs to be converted to binary data so that it can be processed by a computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) The denary values 64, 101 and 242 are converted to 8-bit binary values.
64 ..............................................................................................................................................
101 ............................................................................................................................................
242 ............................................................................................................................................
[3]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
42 ..............................................................................................................................................
CE .............................................................................................................................................
[4]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
5 An image is stored on a computer. The image is 16-bit colour and is 100 pixels high and
150 pixels wide.
Calculate the file size of the image in bytes. Show all your working.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
(a) One similarity between a compiler and an interpreter is that they both translate high-level
language into machine code.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
7 Adele chooses to set a biometric password for her mobile device, instead of a
personal identification number (PIN).
...................................................................................................................................................
............................................................................................................................................. [1]
(b) Give two reasons why a biometric password is more secure than a PIN.
Reason 1 ..................................................................................................................................
...................................................................................................................................................
Reason 2 ..................................................................................................................................
...................................................................................................................................................
[2]
The firewall gathers data about the traffic coming into and going out of her mobile device.
Explain how the firewall uses the gathered data to keep the mobile device more secure.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(d) Adele also encrypts the data on her mobile device to keep it more secure.
...................................................................................................................................................
............................................................................................................................................. [1]
Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.
B X
[6]
(b) Complete the truth table for the given logic statement.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
9 Three Internet terms are browser, Internet Protocol (IP) address and
Uniform Resource Locator (URL).
Tick (3) to show which statements apply to each Internet term. Some statements may apply to
more than one Internet term.
it is a type of software
it is a type of address
it stores cookies
[5]
Feature 1 ..........................................................................................................................................
..........................................................................................................................................................
Feature 2 ..........................................................................................................................................
..........................................................................................................................................................
Feature 3 ..........................................................................................................................................
..........................................................................................................................................................
[3]
11 (a) The paragraph describes the process of printing a document using an inkjet printer.
Complete the paragraph using the most appropriate terms from the list. Not all of the terms in
the list need to be used.
• binary
• buffer
• drum
• information
• interrupt
• laser
• liquid
• nozzles
• operating system
• powder
• thermal bubble
• toner
Data is sent from the computer to the printer. The data is held in a print
processed to be printed.
technology.
If the paper jams in the printing process, the printing stops and an
Example 1 .................................................................................................................................
Example 2 .................................................................................................................................
Example 3 .................................................................................................................................
[3]
Example 1 .................................................................................................................................
Example 2 .................................................................................................................................
Example 3 .................................................................................................................................
[3]
© UCLES 2022 0478/11/M/J/22 [Turn over
12
Identify and describe three ethical issues that could be a concern when using the Internet.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (RW) 303775/2
© UCLES 2022 [Turn over
2
Draw one line from each denary value to the correctly converted 8-bit binary value.
00100001
41
10100110
00101001
174
10000110
10101110
86
01010110
[3]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Give the correct denary value for the 12-bit binary value 000101010111
Show all your working.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(a) Give the 8-bit binary value that would be stored for each pair of hexadecimal digits.
2F
15
D6
[6]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(b) HTML colour codes and Media Access Control (MAC) addresses are two examples of where
hexadecimal is used in Computer Science.
Give two other examples of where hexadecimal can be used in Computer Science.
Example 1 .................................................................................................................................
Example 2 .................................................................................................................................
[2]
Structure ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Presentation .............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(d) Explain why presentation is often separated from structure when creating a web page.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(a) The table contains five terms or definitions that relate to the Internet.
Term Definition
........................................................................................
browser ........................................................................................
........................................................................................
........................................................................................
........................................................................................
........................................................................................
cookie ........................................................................................
........................................................................................
[5]
(b) Joelle uses a firewall to keep her data safe when she uses the Internet.
Tick (3)
(c) Joelle’s parent also uses the firewall to limit the websites that Joelle can access.
Explain how the firewall is used to limit the websites that Joelle can access.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Jason wants to distribute a computer program he has written. He is considering distributing it
to users as freeware or free software.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Explain one benefit to a user if the program is distributed as free software.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.
B X
[5]
(b) Complete the truth table for the given logic statement.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(a) Identify two online security attacks that can be carried out using email.
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
One security method to keep data safe from online attacks is a firewall.
Identify two other security methods that keep data safe from online attacks.
One example of how data can be damaged accidentally is by shutting down a computer
before saving data. To prevent this from happening, a user should make sure they have
saved all data before shutting down a computer.
Complete the table by giving three other examples of how data can be damaged accidentally.
...................................................................... ......................................................................
...................................................................... ......................................................................
...................................................................... ......................................................................
......................................................................
...................................................................... ......................................................................
...................................................................... ......................................................................
...................................................................... ......................................................................
......................................................................
...................................................................... ......................................................................
...................................................................... ......................................................................
...................................................................... ......................................................................
......................................................................
[6]
7 Cassie stores data for her business every day. She stores the data using optical data storage.
Example 1 .................................................................................................................................
Example 2 .................................................................................................................................
Example 3 .................................................................................................................................
[3]
(b) Six statements are given about the operation of three different types of storage.
Tick (3) to show which statements apply to each type of storage. Some statements may
apply to more than one type of storage.
Type of storage
Magnetic Optical Solid state
Statement
(3) (3) (3)
[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Identify three ethical issues that may need to be considered when developing and distributing
software.
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CJ) 303905/4
© UCLES 2022 [Turn over
2
Tick (3) to show if each device is an example of an input device, an output device or a
storage device.
keyboard
microphone
headphones
actuator
[5]
(b) There are three different types of storage device. One type is magnetic.
Type 1 .......................................................................................................................................
Type 2 .......................................................................................................................................
[2]
2 An aeroplane has a small display screen above each seat, to display the seat number.
(a) The seat number is a hexadecimal value. A 12-bit binary register is used to store the data to
display each seat number.
Three seat numbers, 05A, 18C and 29F, are allocated to passengers.
Give the 12-bit binary value that would be stored for each hexadecimal seat number.
05A ...........................................................................................................................................
18C ...........................................................................................................................................
29F ...........................................................................................................................................
[6]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(b) The display screen used above each seat is a Light-Emitting Diode (LED) display screen.
Give two reasons why an LED display screen has been used.
Reason 1 ..................................................................................................................................
...................................................................................................................................................
Reason 2 ..................................................................................................................................
...................................................................................................................................................
[2]
(c) Two of the registers store the values 010000001101 and 000001111110
Give the hexadecimal seat number that would be displayed on the screen for each of these
binary values.
010000001101 ....................................................................................
000001111110 ....................................................................................
[4]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Tick (3) to show which statements apply to each logic gate. Some statements may apply to
more than one logic gate.
AND OR XOR
Statement
(3) (3) (3)
[4]
(b) NOT, AND, OR and XOR are all examples of logic gates.
State the name of two other logic gates and complete a truth table for each.
A B Output
0 0
0 1
1 0
1 1
A B Output
0 0
0 1
1 0
1 1
[4]
4 Freddie types a Uniform Resource Locator (URL) into the address bar of his browser.
(a) A URL is a text-based version of a website address. It is made up of several different parts.
Part 1 ........................................................................................................................................
Part 2 ........................................................................................................................................
Part 3 ........................................................................................................................................
[3]
(b) Explain how the URL is converted into an Internet Protocol (IP) address for the website.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) A protocol is used to securely transmit the data for the website to the browser.
..................................................................................................................................... [1]
(ii) Identify how this protocol changes the data to transmit the data securely.
..................................................................................................................................... [1]
5 Harriet has a computer that is based on a Von Neumann model for a computer system.
Identify the three stages of the cycle performed by the CPU in your answer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
(b) The memory address register (MAR) is one component built into the CPU.
(i) Identify four other components that are built into the CPU.
Component 1 .....................................................................................................................
Component 2 .....................................................................................................................
Component 3 .....................................................................................................................
Component 4 .....................................................................................................................
[4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [7]
(ii) The secondary storage in Harriet’s computer is damaged, so it is removed for repair.
This means the computer will no longer work.
Explain why the secondary storage is needed for the computer to work.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(a) Tick (3) to show which type of data is stored in a JPEG file.
Tick (3)
Video
Sound
Image
[1]
Tick (3) to show whether the JPEG file is a lossy compressed file or a lossless compressed
file or not a compressed file.
Tick (3)
[1]
(c) Frida scans a text document into her computer so that she can store a digital version. She
uses a 2D scanner to do this.
Describe how the text document is scanned by the 2D scanner to create the digital version.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
The compression algorithm she uses recognises repeating patterns in the data and indexes
these patterns. No data is permanently removed.
............................................................................................................................................. [1]
7 Umar is a manager in an office. The data that he uses on a daily basis is stored on a file server
close to his computer.
Data is sent from his computer to the file server using parallel simplex data transmission.
(a) Describe how the data is sent using parallel simplex data transmission.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Explain why the parallel simplex data transmission method that Umar uses is no longer
suitable.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) Checksum and Automatic Repeat reQuest (ARQ) are both used when transmitting the data
from a computer to the file server.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Complete the paragraph using the most appropriate terms from the list. Not all terms in the list
need to be used.
• all at once
• assembler
• assembly language
• binary
• commenting
• compiling
• debugging
• executable file
• high-level language
• interpreted
• is not required
• is required
• line by line
• low-level language
translating and reports an error at the place where it occurs in the code.
[6]
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (EF) 313965/2
© UCLES 2023 [Turn over
2
(a) Tick (3) one box to show which statement about the binary number system is correct.
A It is a base 1 system
B It is a base 2 system
C It is a base 10 system
D It is a base 16 system
[1]
50 ..............................................................................................................................................
102 ............................................................................................................................................
221 ............................................................................................................................................
[3]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Register:
[2]
00110011
+01100001
[3]
(e) Two binary numbers are added by a computer and an overflow error occurs.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
2 A student has a sound file that is too large to be stored on their external secondary storage device.
The student compresses the sound file to make the file size smaller.
The compression method used reduces the sample rate and the sample resolution of the sound
file.
(a) State what is meant by the sample rate and sample resolution.
...................................................................................................................................................
...................................................................................................................................................
[2]
(b) Identify which type of compression has been used to compress the sound file.
...................................................................................................................................................
............................................................................................................................................. [1]
(c) The student sends the sound file to a friend. The file is transmitted across a network that uses
packet switching.
(i) Identify two pieces of data that would be included in the header of each packet.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
hard disk drive (HDD) random access memory (RAM) read only memory (ROM)
[3]
(b) Tick (3) one box to show which statement about secondary storage is correct.
D It is volatile.
[1]
Some of the terms in the list will not be used. You should only use a term once.
the ........................................................................ .
[4]
5 A farm has an automated drinking system for its animals. The drinking system has a water bowl
that contains the water. When the water bowl is empty, it is automatically refilled.
............................................................................................................................................. [1]
(b) Describe how the sensor and the microprocessor are used to automatically refill the water
bowl.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(a) (i) Identify the component in the computer that is needed to access a network.
..................................................................................................................................... [1]
(ii) Identify the type of address that is allocated to the component by the manufacturer,
which is used to uniquely identify the device.
..................................................................................................................................... [1]
(b) A dynamic internet protocol (IP) address is allocated to the computer when it is connected to
the network.
(i) Identify the device on the network that can connect multiple devices and automatically
assign them an IP address.
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
7 A programmer uses a low-level language to write a computer program for a vending machine.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Give two reasons why the programmer would choose to write the computer program in a
low-level language instead of a high-level language.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2023 0478/11/M/J/23 [Turn over
8
8 A manager at a company is concerned about a brute-force attack on its employee user accounts.
(a) Describe how a brute-force attack can be used to gain access to the employee user accounts.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) One possible aim for carrying out a brute-force attack is to install malware onto the company
network.
(i) State two other aims for carrying out a brute-force attack to gain access to the employee
user accounts.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(c) Give two security solutions that could be used to help prevent a brute-force attack being
successful.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Give two advantages to company employees of using robots to manufacture large pieces of
furniture.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(c) Give one disadvantage to the company’s owners of using robots to manufacture large pieces
of furniture.
...................................................................................................................................................
............................................................................................................................................. [1]
10 A student uses the internet for their schoolwork to research what is meant by pharming.
...................................................................................................................................................
............................................................................................................................................. [1]
[4]
(c) The student uses a web browser to access data on the internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(e) A student visits a website that uses session cookies, instead of persistent cookies.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (EF) 313966/2
© UCLES 2023 [Turn over
2
10010011 ..................................................................................................................................
00001101 ..................................................................................................................................
[4]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
0 1 1 1 1 0 1 0
(i) Complete the binary register to show its contents after this logical right shift.
[1]
(ii) State one effect this logical shift has on the binary number.
...........................................................................................................................................
..................................................................................................................................... [1]
(c) Give two reasons why a programmer may use hexadecimal to represent binary numbers.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 When keys are pressed on a keyboard, the text is converted to binary to be processed by the
computer.
(a) Describe how the text is converted to binary to be processed by the computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Text that is input into a computer can be stored in a text file.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(iii) Give two reasons why the text file may have been compressed.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
The student needs to transmit the photographs to their computer. They could use serial data
transmission or parallel data transmission to transmit the photographs.
(a) (i) Describe how the photographs would be transmitted using serial data transmission.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Give two benefits of transmitting the photographs using serial data transmission.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(iii) State one benefit of the student using parallel data transmission instead of serial data
transmission.
...........................................................................................................................................
..................................................................................................................................... [1]
(b) The photographs are also transmitted across a network to cloud storage. A device on the
network forwards the data towards its correct destination.
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(iii) Give one disadvantage of storing the photographs in cloud storage instead of storing
them locally.
...........................................................................................................................................
..................................................................................................................................... [1]
© UCLES 2023 0478/12/M/J/23 [Turn over
6
(a) Tick (3) one box to show which statement is correct about writing computer programs in a
high-level language.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(c) The programmer uses an integrated development environment (IDE) to create the computer
program.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
Some of the terms in the list will not be used. Some terms may be used more than once.
secondary storage.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
[6]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(c) Give two security solutions that can be used to help prevent a DDoS attack being successful.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(a) Tick (3) one box to show which device would assign the IPv4 address to the computer.
C Router
D Web server
[1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
10 A user has both system software and application software installed on their computer.
(a) Describe the difference between system software and application software.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) State which component in the computer would store both types of software when the power is
turned off.
............................................................................................................................................. [1]
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CJ) 313967/3
© UCLES 2023 [Turn over
2
............................................................................................................................................. [1]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(c) A logical left shift of three places is performed on the binary number.
(i) Give the 8-bit binary number that would be stored after this logical left shift.
..................................................................................................................................... [1]
(ii) Tick (3) one box to show which statement is true about the impact the logical left binary
shift would have on the binary number.
(d) Add the two 8-bit binary numbers 11101110 and 00110001 using binary addition.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Calculate the least number of bits that can be used to store the denary number 301.
............................................................................................................................................. [1]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Calculate the least number of bits that can be used to store the hexadecimal number A4D.
............................................................................................................................................. [1]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 A library has a self-checkout system that allows customers to register books that they want to
borrow.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) The CPU is replaced with one that has four cores.
Explain the effect this has on the performance of the self-checkout system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Identify one bus that can be found in the CPU and explain its purpose in the
fetch–decode–execute cycle.
Bus ....................................................................................................................................
Purpose .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(d) The self-checkout system allows the user to input their library membership number.
Give two appropriate input devices that would allow the user to do this.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(e) The self-checkout system uses a monitor to display information about the book.
Users who are blind also need to use the self-checkout system.
Give an appropriate output device that would allow a blind user to be given this information.
............................................................................................................................................. [1]
Circle two types of primary storage that would be used in the system.
read only memory (ROM) universal serial bus (USB) flash memory drive
[2]
(g) The self-checkout system is linked to a stock control system that is updated every time a
book is borrowed from the library.
Explain the role of the microprocessor in this system and how it is used to update the stock
when a book is borrowed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Term Definition
.............................................................................................
.............................................................................................
router
.............................................................................................
.............................................................................................
.............................................................................................
.............................................................................................
network interface card (NIC)
.............................................................................................
.............................................................................................
(a) Tick (3) one box to show which statement is a benefit of writing a program in a high-level
language, instead of a low-level language.
(b) Translators are used to translate the high-level language so that it can be processed by the
computer.
..................................................................................................................................... [1]
(ii) One translator converts and executes the code line by line.
..................................................................................................................................... [1]
(iii) One translator creates an error report displaying all the errors in the code before it can
be executed.
..................................................................................................................................... [1]
..................................................................................................................................... [1]
5 Complete and annotate the diagram to demonstrate how packet switching is used to transmit data
across a network, including the use of routers, from Device A to Device B.
Device A Device B
[4]
6 A student is writing a help guide about how to recognise and avoid the cyber-security threat of
pharming.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(b) The student also wants to include information in the help guide about the use of social
engineering as a cyber-security threat.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) The student includes information about the security solution of access levels.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
7 The rule base and the inference engine are two components of an expert system.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Some of the terms in the list will not be used. You should only use a term once.
When the attacker wants the DDoS to take place, repeated requests are simultaneously sent from
this hardware.
[5]
9 A device can be given an internet protocol (IP) address. This can be an IPv4 or IPv6.
...................................................................................................................................................
............................................................................................................................................. [1]
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(i) Identify the system that stores a database of uniform resource locators (URLs) and their
corresponding IP addresses.
..................................................................................................................................... [1]
(ii) Identify the software that sends a request to the IP address to obtain the web page data.
..................................................................................................................................... [1]
10 A computer has pages A, B and C that are stored in RAM. Page D needs to be sent to the RAM
but the RAM is full.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
(a) State the name of the software that can do these tasks.
............................................................................................................................................. [1]
(b) Give one task that the software allows the user to do to manage files.
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
............................................................................................................................................. [1]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.