ICT 0417 - s22 - QP - 11
ICT 0417 - s22 - QP - 11
ICT 0417 - s22 - QP - 11
Cambridge IGCSE
INSTRUCTIONS
• Answer all questions.
• Use a black or dark blue pen.
• Write your name, centre number and candidate number in the boxes at the top of the page.
• Write your answer to each question in the space provided.
• Do not use an erasable pen or correction fluid.
• Do not write on any bar codes.
• You may use an HB pencil for any diagrams, graphs or rough working.
INFORMATION
• The total mark for this paper is 100.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware.
06_0417_11_2022_1.16
© UCLES 2022 [Turn over
2
[2]
2 Complete each sentence using the most appropriate item from the list. Your answers must be
different in each case.
software
........................................................................................................................................... [1]
an applet
........................................................................................................................................... [1]
a sensor
........................................................................................................................................... [1]
[2]
4 Many laptop computers use the cloud to store data. A technician has produced a report on his
laptop computer but has stored the report on a memory stick rather than storing it on the cloud.
Describe two advantages of using a memory stick rather than the cloud to store data.
..................................................................................................................................................
..................................................................................................................................................
[2]
Describe the advantages and disadvantages of using these cards rather than cards that use chip
and PIN.
..................................................................................................................................................
..................................................................................................................................................
It makes transactions faster as users do not need to key in passwords. It is safer as it prevents
..................................................................................................................................................
from shoulder surfing. However, it may be easy for hackers to hack into card and misuse it.
Also, a pin is not required so money in card can be easily stolen by others.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [4]
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Explain the differences between attached stylesheets and inline style attributes.
...........................................................................................................................................
...........................................................................................................................................
attached stylesheet are separately linked to HTML while inline style attributes are within
the HTML. attached stylesheet an style multiple elements across multiple pages while
...........................................................................................................................................
inline style attributes can only affect specific elements.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(a) Compare and contrast relational databases and flat file databases. Your answer must include
similarities and differences.
...........................................................................................................................................
...........................................................................................................................................
both relational database and flat files uses a primary key and stores data in table form.
...........................................................................................................................................
relational databases are more powerful and flexible than flat files, usually used to manage
complex data. Flat files are simple and lightweight, making it easy to manage simple data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [8]
(b) Give, using an example, one reason why flat file databases are used in certain applications
rather than relational databases.
...........................................................................................................................................
list of names
Example ............................................................................................................................
...........................................................................................................................................
[2]
8 When using computers people can suffer from Repetitive Strain Injury (RSI).
(a) Describe the term RSI. Include in your answer the causes of RSI.
...........................................................................................................................................
...........................................................................................................................................
RSI is aches and pain in the hands and fingers and is usually caused by repetitive
...........................................................................................................................................
movements and overuse of certain muscles.
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
9 Martin, who is a teacher, is creating a multimedia presentation to explain a topic to his students.
text
2 ........................................................................................................................................
images
3 ........................................................................................................................................
slide numbers
4 ........................................................................................................................................
[4]
(b) Martin wants to record a message for his students. His voice will be added to the presentation.
He will also need to listen to his voice to make sure the sound is of good quality.
speaker
1 ........................................................................................................................................
microphone
2 ........................................................................................................................................
[2]
(c) Martin will need to use software to create different types of content before including them in
the presentation.
Name two types of software that he might use and for each one, write down what he would
use it for.
word processor
Software 1 ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
presentation
Software 2 ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
10 A river authority is concerned about levels of pollution in a major river. The quality of the water in
the river needs to be monitored using sensors.
(a) Name three sensors that could be used to measure the pollution in the river.
pH levels
1 ........................................................................................................................................
oxygen levels
2 ........................................................................................................................................
temperature
3 ........................................................................................................................................
[3]
(b) Discuss the advantages and disadvantages of using computers to measure the pollution in
the river rather than humans measuring the pollution.
...........................................................................................................................................
It is more accurate as computers can collect more detailed data than humans. It is less time
...........................................................................................................................................
consuming, and it is also more efficient as computers can work for longer period of time
without breaks. However, it is less costly for humans to measure pollution than computers.
...........................................................................................................................................
The computers are required to have the systems or sensors needed to measure pollution.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [6]
Discuss the advantages and disadvantages of analysing a system by interviewing staff rather than
using questionnaires.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
Interview might make people feel more comfortable as they are conversating with another
..................................................................................................................................................
person. It is also more accurate as interviewer is able to add questions to the interviewee.
Also, the interviewee is able to ask more detailed answers by asking questions and explaining
..................................................................................................................................................
them to interviewers. However, both the interviewee and interviewer need to have time for the
interview. Answer collected from questionnaires are also quicker than interviews and
..................................................................................................................................................
questionnaires can be sent to more people.
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [6]
12 Many company computer network systems use WiFi as a communication system to help prevent
the issue of tripping over trailing cables.
(a) For each of the following physical safety issues describe two ways of helping to prevent them.
(i) Fire
................................................................................................................................
make sure to turn off power of any appliances that is not in use
Prevention 2 ..........................................................................................................
................................................................................................................................
[2]
(ii) Electrocution
do not touch power sockets with wet hands
Prevention 1 ..........................................................................................................
................................................................................................................................
do not touch power sockets with any metal in hand
Prevention 2 ..........................................................................................................
................................................................................................................................
[2]
(b) Describe three eSafety measures which should be taken when playing games on the internet.
...........................................................................................................................................
...........................................................................................................................................
do not show your address
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(c) In order to log onto online gaming a user ID and password is needed.
Explain what is meant by a user ID and password and why they are needed.
...........................................................................................................................................
user ID and passwords are forms of digital authentication systems. user ID is a unique
...........................................................................................................................................
identifier which makes it easier to identify specific users within a system or application. a
password on the other hand is a unique set of characters used as a security measure to
...........................................................................................................................................
authenticate user identity and protect personal data form being stolen or hacked by hackers.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
13 (a) Explain the need for copyright legislation when data is published on the internet.
...........................................................................................................................................
copyright is a legal right approved from the owner of a specific work to allow others to copy
...........................................................................................................................................
the work. it is needed so that original work of the owner can be protected from other users
who try to steal the work and own it as their own without the original owner's permission.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(b) Describe methods that software producers use to prevent software copyright being broken.
...........................................................................................................................................
one method is holograms which are often used on the packaging that indicates that the
...........................................................................................................................................
copy is genuine. another method is license agreement which are part of the software
installation process that informs the user who wants to copy the original work how they are
...........................................................................................................................................
legally allowed to use the work.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
(c) Emails are used by people to communicate with each other. Copyright and using acceptable
language in the email are two of the constraints that affect the use of email.
(i) Describe four other constraints that may affect the use of email.
................................................................................................................................
copyrights
2 ............................................................................................................................
................................................................................................................................
the need for security
3 ............................................................................................................................
................................................................................................................................
password protection
4 ............................................................................................................................
................................................................................................................................
[4]
................................................................................................................................
use professional email address
2 ............................................................................................................................
................................................................................................................................
[2]
14 The manager of a medical centre keeps the doctor’s stock records in a database. The stock for
any item is not allowed to fall below 15 items and the manager keeps a maximum of 100 items in
stock.
to check whether the data entered is accurate and matches the original document
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
(b) Write down the field name from the table that would be the most appropriate for each of these
validation checks. Each answer must be different.
serial number
Check digit ........................................................................................................................
shelf number
Length ...............................................................................................................................
name of item
Type ..................................................................................................................................
[3]
(c) Name the most appropriate field from the table that could be used as a primary key in the
database.
serial number
........................................................................................................................................... [1]
15 A customer is booking a seat on a theatre’s online booking system. The customer reserves seats
using the theatre’s website and a debit card. The website displays the seats that are available and
a database stores the customer details, the payment details and the seat details.
When the customer enters their debit card details for a seat, the theatre’s computer communicates
with the bank’s computer.
(a) Describe four checks that the bank’s computer will make on the customer’s bank account.
...........................................................................................................................................
if the pin entered is the same with the data stored in the chip
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
if there is any unusual spendings
4 ........................................................................................................................................
...........................................................................................................................................
[4]
(b) Describe the processing carried out by the theatre’s computer when making a booking.
...........................................................................................................................................
the booking details including available shows, dates, times and more are listed for customers
...........................................................................................................................................
to choose. the computer then displays payment information. customers choose checkout
methods and a printed ticket is printed for the customer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge Assessment
International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at
www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge Local
Examinations Syndicate (UCLES), which is a department of the University of Cambridge.