Cambridge International General Certificate of Secondary Education
Cambridge International General Certificate of Secondary Education
Cambridge International General Certificate of Secondary Education
Write your Centre number, candidate number and name in the spaces at the top of this page and any additional
pages you use.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
No marks will be awarded for using brand names of software packages or hardware.
Answer all questions.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The syllabus is approved for use in England, Wales and Northern Ireland as a Cambridge International Level 1/Level 2 Certificate.
DC (CE/FD) 132683/3
© UCLES 2017 [Turn over
2
1 Complete the sentences, using the most appropriate item from the list.
(a) Optical storage medium that is often used to store HD movies is called
...............................................................................................................................................[1]
...............................................................................................................................................[1]
(c) Magnetic medium which can only be used for serial access is called
...............................................................................................................................................[1]
...............................................................................................................................................[1]
application system
(3) (3)
Linker
Photo-editing software
Compiler
[2]
true false
(3) (3)
CRT monitors use more power than TFT monitors
Tick
(3)
Compare with source document
Carry out a range check on the data
Only accept alphabetic characters
Get a second person to read through the document
Ensure the data is 100% accurate
Type in the data twice and compare versions
Calculate a check digit
Check spelling
[3]
5 Identify three ways in which employment patterns have changed since the introduction of ICT.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
[3]
6 Peter was asked to resize an image to fit a space in a document. The image before the change
and the image after the change are shown below.
The image before the change The image after the change
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Peter has been asked to remove some of the sky in the image.
...................................................................................................................................................
...............................................................................................................................................[1]
(c) Having created the document, Peter needs to email it to his teacher. The file is too large for
the email attachment. The file size must be reduced so it can be attached to the email.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
7 An electricity company has created a new computer system to produce its bills.
After the system was implemented a number of customers complained about very expensive bills.
(a) Explain what other testing should have been carried out before the system was implemented.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Prior to implementation the management was undecided over the method of changeover to
be used.
Explain why the management would choose direct changeover rather than parallel running.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
8 Data transmitted through the World Wide Web can be protected by encryption.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(a) Give three methods of reading the data from the credit card.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(b) Shopping for groceries using the internet has become popular and is replacing more traditional
types of grocery shopping.
Describe the advantages and disadvantages of grocery shopping using the internet rather
than other methods.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
...................................................................................................................................................
...............................................................................................................................................[1]
© UCLES 2017 0417/13/O/N/17 [Turn over
8
11 A school library has computerised its book borrowing system. Students are allowed to borrow
books free of charge.
(a) When a book is borrowed the details of the book and the borrower have to be input to the
system.
Tick three direct data entry devices which could be used in such a system.
(b) The library uses a database with two tables: borrowers and books. They have recently
purchased a biometric reader which will identify the borrower from their thumb print. A
borrower may only borrow a maximum of six books.
Describe the computer processing involved when a book is borrowed using this system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
12 A systems analyst is creating a new database for a shop to store the details of its mobile (cell)
phones. Part of the design of this database will involve the identification of suitable validation
checks.
(a) For the following fields write down the most appropriate validation check. Each validation
check must be different. The database will have at least 100 records and each ID number will
be different.
ID_number
...................................................................................................................................................
...............................................................................................................................................[1]
Connectivity
...................................................................................................................................................
...............................................................................................................................................[1]
Price
...................................................................................................................................................
...............................................................................................................................................[1]
(b) Design a screen input form which would be used to input data for one mobile (cell) phone,
using all the fields shown in the example data.
In your answer include appropriate spacing for each field, and navigational aids.
[5]
(c) The system is being tested using live data. Write the search criteria you would enter into
the database to search for a mobile (cell) phone costing less than $200.00 which has a
connectivity of 4G.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
13 A theatre uses an online booking system to allow customers to book specific seats for its
performances.
A customer has loaded the theatre website. Describe the inputs and outputs of such a system
before the customer pays for a ticket.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[5]
14 Contactless debit cards are replacing standard debit cards. Some countries are introducing
contactless debit card transactions at ATM machines.
Discuss the advantages and disadvantages to the bank of using these cards at an ATM.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
15 Computers can be used in different applications to control a process, to simply gather data
(measurement only) or to mimic a human expert (expert systems).
(a) Tick whether the following applications use Control, Measurement (only) or Expert system.
(b) Measurement systems can use sensors. The computer cannot read the data directly from the
sensor.
Explain how a device can be used to enable the computer to read the data from the sensor.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
16 State what is meant by OMR and MICR, giving an example of their use.
OMR .................................................................................................................................................
..........................................................................................................................................................
Example ...........................................................................................................................................
..........................................................................................................................................................
MICR ................................................................................................................................................
..........................................................................................................................................................
Example ...........................................................................................................................................
..........................................................................................................................................................
[4]
17 Social networking is often used today rather than face-to-face conversations, letter writing and
telephone conversations.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[8]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.