IGCSE - ICT - Paper 1 Theory - Paper 12
IGCSE - ICT - Paper 1 Theory - Paper 12
IGCSE - ICT - Paper 1 Theory - Paper 12
Paper 1 Theory
8
INSTRUCTIONS
• Answer all questions. 06_0417_12_2023_1.13
© UCLES 2023
• Use a black or dark blue pen.
0417/12
May/June 2023 1 hour 30 minutes
INFORMATION
[Turn over
• The total mark for this paper is 80.
2
1
A book contains a bar code whose number is 503619309903
Tick (✓) the most appropriate validation check to test the validity of the bar code.
A check digit
B format check
C range check
D spell check
[1]
(c)
an internal component that is composed of the main memory, the control unit and the
arithmetic logic unit.
........................................................................................................................................... [1]
3
A headteacher is producing a web page about the history of her school. She has been given some
old hard-copy photographs which she will include on the web page. She has a digital camera and a
scanner to use to convert the hard-copy photographs into a digital format.
Compare the use of a digital camera with a scanner in this scenario. Your answer must include
similarities and differences.
.................................................................................................................................................. ............
...................................................................................................................................... ........................
.......................................................................................................................... ....................................
.............................................................................................................. ................................................
.................................................................................................. ............................................................
...................................................................................... ........................................................................
.......................................................................... ....................................................................................
.............................................................. [4]
........................................................................................................................................... ...........
................................................................................................................................ ......................
..................................................................................................................... .................................
.......................................................................................................... [2]
........................................................................................................................................... ...........
................................................................................................................................ ......................
..................................................................................................................... .................................
.......................................................................................................... [2]
5
State which health issue is most likely to occur from each description shown. Your answer must
be different in each case.
........................................................................................................................................... [1]
(a) Explain three problems that may occur when the employees change their passwords regularly. 1
........................................................................................................................................ ......................
..................................................................................................................... .........................................
.................................................................................................. ............................................................
...............................................................................
2 ........................................................................................................................................ ...................
........................................................................................................................ ......................................
..................................................................................................... .........................................................
..................................................................................
3 ........................................................................................................................................ ...................
........................................................................................................................ ......................................
..................................................................................................... .........................................................
.................................................................................. [6]
(b)
The company has a website which uses a digital certificate.
........................................................................................................................................... ...........
................................................................................................................................ [1]
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................ [3]
7
A student is creating a spreadsheet that includes a formula to check a number entered in a cell is
between two values.
• The number is entered in cell A10 as an integer.
• If the number is between the two values then a message ‘OK’ is displayed, otherwise ‘error’ is
displayed.
=IF(AND(A10>1,A10<32),"OK","error")
(a)
Identify two items of extreme test data the student should use and give the reason why this
data was chosen.
............................................................................................................................... [3]
(b)
The student has entered an item of abnormal test data.
........................................................................................................................................... ...........
................................................................................................................................ ......................
..................................................................................................................... .................................
.......................................................................................................... ............................................
............................................................................................... .......................................................
.................................................................................... [3]
8
A teacher provides revision lessons during the holidays. The teacher plans to use web-conferencing
for the lessons.
................................................................................................................................ ......................
..................................................................................................................... .................................
.......................................................................................................... ............................................
............................................................................................... .......................................................
.................................................................................... [3]
........................................................................................................................................... ...........
................................................................................................................................ ......................
..................................................................................................................... .................................
.......................................................................................................... ............................................
............................................................................................... .......................................................
.................................................................................... ..................................................................
......................................................................... .............................................................................
.............................................................. ........................................................................................
................................................... ...................................................................................................
........................................ ..............................................................................................................
............................. .........................................................................................................................
.................. [6]
.........................................................................................
The products in a warehouse contain either a bar code
or a Radio Frequency Identification (RFID) tag. .................................................. ......................................
........................................................................................ [6]
........ ...............................................................................
1 ........................................................................................................................................
2 ........................................................................................................................................ [2]
(a)
A metatag can be used to define the viewport settings.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................ [3]
(b)
Metatags are used in the HTML of web pages.
11 Some gaming systems use gesture based user interfaces to operate a game. (a)
........................................................................................................................................... ...........
................................................................................................................................ ......................
..................................................................................................................... .................................
.......................................................................................................... [2]
(b) Describe the drawbacks of using gesture based user interfaces in this
........................................................................................................................................ ..............
............................................................................................................................. .........................
.................................................................................................................. ....................................
....................................................................................................... ...............................................
............................................................................................ ..........................................................
................................................................................. .....................................................................
...................................................................... [4]
(a) Describe why Blu-ray discs are preferred to an internal hard disk for storing
movies. ..........................................................................................................................................
. ........................................................................................................................................... .........
.................................................................................................................................. ....................
....................................................................................................................... ...............................
............................................................................................................ ..........................................
................................................................................................. .....................................................
...................................................................................... ................................................................
........................................................................... [4]
(b) Hard disks and Blu-ray discs are examples of backing storage.
(i) State two characteristics of backing storage.
1 ............................................................................................................................ ............
....................................................................................................................
2 ............................................................................................................................ ............
.................................................................................................................... [2]
1 ............................................................................................................................
2 ............................................................................................................................ [2]
........................................................................................................................................... ...........
................................................................................................................................ ......................
..................................................................................................................... .................................
.......................................................................................................... ............................................
............................................................................................... .......................................................
.................................................................................... ..................................................................
......................................................................... .............................................................................
.............................................................. [4]
Data is collected by different types of sensor and then input to the computer model to be
(b)
processed.
1 ........................................................................................................................................
2 ........................................................................................................................................ [2]
(c)
The processed data is then output.
1 ........................................................................................................................................
2 ........................................................................................................................................ [2]
14 ePublishing software is used to create an ePublication to display a school’s yearly magazine. (a)
........................................................................................................................................... ...........
................................................................................................................................ ......................
..................................................................................................................... .................................
.......................................................................................................... ............................................
............................................................................................... .......................................................
.................................................................................... ..................................................................
......................................................................... .............................................................................
.............................................................. [4]
(b)
The ePublishing software is subject to software copyright legislation.
Give two methods that could be used to prevent software copyright legislation being broken.
1 ........................................................................................................................................ ...........
................................................................................................................................
2 ........................................................................................................................................ ...........
................................................................................................................................ [2]
© UCLES 2023 06_0417_12_2023_1.13
12
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort
has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to
make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.