Ictnew
Ictnew
Ictnew
Cambridge IGCSE
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 80.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
03_0417_12_2024_1.7
© UCLES 2024 [Turn over
2
[2]
(a) Explain what the following types of software provide in the computer system.
System ..............................................................................................................................
Software that the computer requires. I.e linker, operating system, anti-
...........................................................................................................................................
virus
[2]
(i) Applications
1 .............................................................................................................................
above
2 .............................................................................................................................
[2]
(ii) System
1 .............................................................................................................................
Above
2 .............................................................................................................................
[2]
..................................................................................................................................................
.................................................................................................................................................. [4]
.................................................................................................................................................. [4]
[2]
6 Augmented Reality can be used with a Global Positioning System (GPS) device.
Aerospace training
1 ........................................................................................................................................
Simulating architectural buildings
2 ........................................................................................................................................
[2]
(b) Describe the differences between Augmented Reality and Virtual Reality.
Augmented reality mixes both the real and virtual world, but VR only make
...........................................................................................................................................
Use of a virtual world. Users can interact with the real world while using AR,
...........................................................................................................................................
But interaction with the real world is impossible with VR as it creates an
...........................................................................................................................................
Entirely new simulated virtual environment.
........................................................................................................................................... [2]
................................................................................................................................
................................................................................................................................ [2]
................................................................................................................................
................................................................................................................................ [2]
(b) Explain how an expert system is used to discover locations to drill for water.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
Do not give out personal information
2.........................................................................................................................................
...........................................................................................................................................
[2]
9 Compare a test strategy with a test plan. Your answer should include similarities and differences.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
10 A form tutor at Tawara School is producing a database about the students in his class.
Data would not be accurate without visual verification. The wrong data
...........................................................................................................................................
Would be copied and this could lead to false data entires of students’
...........................................................................................................................................
Informations
...........................................................................................................................................
........................................................................................................................................... [2]
(b) An example of the date of birth stored on the database is: 15/05/2009
Describe three validation checks that could be carried out on the date of birth.
A range check is carried out on the dates to make sure that dates
...........................................................................................................................................
Dates are greater than 0 and less than 31 or 30. Months are input
...........................................................................................................................................
Between 0 to 12.
...........................................................................................................................................
...........................................................................................................................................
A format check is carried out to make sure that 2 digits, a slash, 2 digits,
...........................................................................................................................................
A slash, and 4 digits are inputted.
...........................................................................................................................................
...........................................................................................................................................
A presence check is carried out to make sure that DOB has been entered.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
11 More people use desktop computers rather than tablet computers when working at home.
(a) Discuss the advantages and disadvantages of using desktop computers rather than
tablet computers for doing work at home.
Desktop computers have bigger screens so more data can be viewed
...........................................................................................................................................
Better. It is also attached to a physical keyboard so, lesser mistakes in
...........................................................................................................................................
Data entries. A desktop computer is typically more powerful than a table
...........................................................................................................................................
Computer so, it can perform tasks that require high performance.
...........................................................................................................................................
A tablet computer is more portable than a desktop computer so, it can be
...........................................................................................................................................
Used in more places than a desktop. It can also access the internet better”
...........................................................................................................................................
As it can be moved around where the connection is better. They’re not
...........................................................................................................................................
Affected by power outages as it runs on battery. No additional peripherals
Required, so it’s less expensive.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
(i) State two input devices that can be used in a desktop computer for working at home.
Webcam
1 .............................................................................................................................
Keyboard
2 .............................................................................................................................
[2]
(ii) State two output devices that can be used in a desktop computer for working at home.
Speaker
1 .............................................................................................................................
2 .............................................................................................................................
Monitor
[2]
12 Describe how data is stored and managed when using cloud computing.
Data is stored in remote servers. Data is stored in more than one server
..................................................................................................................................................
In case of repair or break downs. This is known as data redundancy.
..................................................................................................................................................
An internet connection is required to access the data stored in cloud servers.
..................................................................................................................................................
The cloud servers are owned and maintained by a third party. Data is uploaded
..................................................................................................................................................
To the cloud servers via the internet, and is re-accessed the same way.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
13 Smart devices and microprocessors can monitor and control devices in the home.
Describe, giving examples, the negative effects of using these smart devices.
Because smart devices do all the work, users can lose their manual household
..................................................................................................................................................
Skills. It can also lead to laziness and health problems as users do not need to
..................................................................................................................................................
Do the work manually. Because they’re electronic devices, they’re prone to
..................................................................................................................................................
Cyberattacks and outsiders could gain access to these devices. These devices
..................................................................................................................................................
Make use of sensors, actuators, and other electrical components. If they
..................................................................................................................................................
Malfunction, they may not work as intended. Repairing these objects would
..................................................................................................................................................
Be also costly.
..................................................................................................................................................
.................................................................................................................................................. [4]
(b) State the web development layer where the stylesheet is used.
Presentation layer
........................................................................................................................................... [1]
(a) Describe what factors need to be considered for the age of the audience.
The language used. The need for multimedia. The length of the presentation
...........................................................................................................................................
Audiences’ participation. Examples to illustrate ideas.
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Describe what factors need to be considered for the interests of the audience.
The ratio of text to image. The use of whitespace and content.
...........................................................................................................................................
Interactive elements and technical language
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
...........................................................................................................................................
Has similar email addresses in the to box that is sent out in bulk
2 ........................................................................................................................................
...........................................................................................................................................
Contains attachments
3 ........................................................................................................................................
...........................................................................................................................................
Spelling and grammar mistakes
4 ........................................................................................................................................
...........................................................................................................................................
[4]
...........................................................................................................................................
Do not give out your email address
2 ........................................................................................................................................
...........................................................................................................................................
[2]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.