Sei sulla pagina 1di 16

Cambridge International Examinations Cambridge International General Certificate of Secondary Education Cambridge International General Certificate of Secondary Education

International General Certificate of Secondary Education INFORMATION AND COMMUNICATION TECHNOLOGY Paper 1 0417/11
International General Certificate of Secondary Education INFORMATION AND COMMUNICATION TECHNOLOGY Paper 1 0417/11
International General Certificate of Secondary Education INFORMATION AND COMMUNICATION TECHNOLOGY Paper 1 0417/11

INFORMATION AND COMMUNICATION TECHNOLOGY Paper 1

0417/11

May/June 2015

 

2 hours

Candidates answer on the Question Paper.

No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES.

No marks will be awarded for using brand names of software packages or hardware.

Answer all questions.

At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question.

This document consists of 13 printed pages and 3 blank pages.

06_0417_11_2015_1.14

© UCLES 2015

06_0417_11_2015_1.14 © UCLES 2015
 

[Turn Over

2

1 This diagram shows a laptop computer being used in a measuring experiment. screen printer
1 This diagram shows a laptop computer being used in a measuring experiment.
screen
printer
pen
drive
DVD drive
touchpad
keyboard

sensor

(a)

Apart from the keyboard, name two input devices shown in the diagram above.

1 Keyboard

2 Touchpad

(b)

Name two output devices shown in the diagram above.

1 Printer

2 Screen

(c)

Name two storage devices shown in the diagram above.

1 Pen drive

2 DVD drive

[2]

[2]

[2]

2 Tick the most appropriate method of inputting data for the following uses.

Magnetic Ink Character Reader

Detect a rotation of the ball about two axis

Use

MICR

Trackerball

Sensor

Reading data from a cheque

Reading data from a cheque

Inputting the temperature of a greenhouse

Inputting the temperature of a greenhouse

People with limited motor skills using computers

People with limited motor skills using computers

Inputting the amount of humidity in a weather station

Inputting the amount of humidity in a weather station

[4]

3

3 Complete the table by identifying the most appropriate output device for each type of application.

Application

Device

Produces very high quality printing where speed is not an issue

INKJET

Production of continuous stationery where noise is not an issue

LASER PRINTER

Produces rapid, high quality and high volume printing

WIDE FORMAT PRINTER

Produces very large printouts such as size A0

DOT MATRIX

[4]

4 Tick which of these statements apply to a Blog, a Microblog or a Wiki.

Very restricted on the size of post

Allows readers to edit posts

Blog

Microblog

of post Allows readers to edit posts Blog ✓ Microblog ✓ Wiki ✓ Entries are not
of post Allows readers to edit posts Blog ✓ Microblog ✓ Wiki ✓ Entries are not

Wiki

Allows readers to edit posts Blog ✓ Microblog ✓ Wiki ✓ Entries are not usually in

Entries are not usually in chronological order

Very difficult to customise

usually in chronological order Very difficult to customise [4] 5 Complete each of the sentences using

[4]

5 Complete each of the sentences using the most appropriate word from the list below.

batch

sensor

OCR

Optical character recognition

fan

MICR

direct

serial

motor

(a)

The type of processing used for processing bank cheques is called

(b)

The type of access used on a magnetic hard disc is called

(c)

An item of hardware which is used to open windows is called a

© UCLES 2015

06_0417_11_2015_1.14

MICR

[1]

[1]

[1]

[Turn Over

4

6 A floor turtle can use the following instructions:

INSTRUCTION

MEANING

FORWARD n

Move n mm forward

BACKWARD n

Move n mm backward

LEFT t

Turn left t degrees

RIGHT t

Turn right t degrees

PENUP

Lift the pen

PENDOWN

Lower the pen

REPEAT n

Repeat the following instructions n times

END REPEAT

Finish the REPEAT loop

30 mm

10 mm

30 mm

END REPEAT Finish the REPEAT loop 30 mm 10 mm 30 mm 30 mm 20 mm

30 mm

20 mm Start Finish
20 mm
Start
Finish

Complete the set of instructions to draw this shape by filling in the blank lines. Do not use additional lines.

PENDOWN

LEFT 90

FORWARD 20

RIGHT 90

PENUP

FOWARD 10

PENDOWN

FOWARD 30

RIGHT 90

FOWARD 30

RIGHT 90

FORWARD 30

[6]

5

7 A home is fitted with a microprocessor-controlled burglar alarm system. It is not connected to a police station.

(a)

Tick three sensors which would be used in such a system.

 

 

Pressure sensor

  Pressure sensor

Oxygen level sensor

Wind speed sensor

Sound sensor

Sound sensor

Body sensor

Moisture sensor

Infra-red sensor

Infra-red sensor

Touch sensor

 

[3]

(b)

Describe how a microprocessor-controlled burglar alarm system operates, referring to those sensors you identified in part (a) .

Microprocessor continually monitors sensors. When a burglar breaks into a house,

using an infra-red sensor can detect any moving position or changes made in the area.

Sound sensor can be used to detect if the burglar has broke in and take something from

a certain area. When these things has been affected, the microprocessor sends the

signals to the alarm.

© UCLES 2015

06_0417_11_2015_1.14

[5]

[Turn Over

6

8 The owner of a sports club has recently had a new computerised stock control system installed. He employed a systems analyst to research the existing system and then install the new system.

(a) Tick the relevant stage of the systems analysis and design (systems life cycle) for each of the following activities.

Activity

Analysis

Design

Evaluation

Interviewing the users of the new system

Interviewing the users of the new system

Interviewing the users of the existing system

Interviewing the users of the existing system

Planning the validation routines

Planning the validation routines

Examining existing documents

Examining existing documents

[4]

(b) Before the system was installed, the systems analyst had to decide on a method of implementation.

Name and describe three methods of implementation.

Name

Paralell Running

Description

Current system and new system run alongside each other

Name

Direct change over

Description

New system replaces old system overnight

Name

Description

Pilot running

New system introduced in one branch and other branches continue with old system

[6]

7

(c)

When the system was implemented, the system analyst gave some documentation to the sports club owner.

Name three items found in the technical documentation of this system.

 

1. File structure

2. Flow charts

3. Known bugs

 

[3]

(d)

Name three items in the user documentation which are not present in the technical documentation.

1. How to load

2. How to print

3. How to save file

 

[3]

© UCLES 2015

06_0417_11_2015_1.14

[Turn Over

8

9

A

headteacher wants to store details of his students’ attendances in a spreadsheet. He has typed

in

the details of two students so far. Each student is identified by a student ID which consists of

one letter followed by 6 digits. The number of possible attendances is recorded along with each student’s actual number of attendances.

 

A

B

C

D

E

     

Possible

Actual

 

1

Student name

Student ID

attendances

attendances

2

         

3

Maria Gonzales

L543789

80

72

 

4

Clive Lloyd

M351209

80

66

 

5

         

6

         

(a)

The headteacher wants to ensure the Student ID is accurately entered.

Describe a method of verifying the input.

Visual verification by comparing it with source of document

(b)

[2]

He wants the spreadsheet to perform a calculation of the percentage attendance of Maria Gonzales in E3.

Explain how he would use the spreadsheet to do this.

=D3/C3*100

[2]

(c)

9

He now wants to add another 18 students to the spreadsheet.

Explain how he could calculate the percentage attendance for each student by only using a computer mouse.

Clicking on cell E3, and click on the black cross on the right corner of the cell.

(d)

And then drag down to E22

[3]

Give two reasons, apart from cost, why computer models are often used instead of the real thing.

1. Easier to change data

2. Less dangerous

 

[2]

10

Tick four drawbacks to car manufacturers of introducing robots on production lines.

 

 

Redundancy payments to previous workers are expensive

  Redundancy payments to previous workers are expensive

The cars produced are not of a consistent standard

Robots are unable to think for themselves

Robots are unable to think for themselves

Robots do not go on strike

Robots are expensive to buy

Robots are expensive to buy

Mistakes are never made

Maintaining robots costs money

Maintaining robots costs money

Car workers have to be paid more

 

[4]

© UCLES 2015

06_0417_11_2015_1.14

[Turn Over

10

11 Explain what is meant by Spam.

(a)

 
 

Spam are electronic junk mail sent to everyone at once.

 

[2]

(b)

Describe how web pages can be used to trick users into giving personal information.

Phishing, by creating the same appearance and making people this it is authentic.

May also send email acting as a bank or organization.

Pharming, installing malicious codes on to a pc and user is indirected to the website

 

[4]

12 Alfonso’s family has three computers. He wants each member of his family to be able to access internet shopping.

(a)

Identify three items of hardware he may need to purchase in order to set up a computer network that will enable this to happen.

1. Cables

2. Netword card

3. Router

[3]

(b)

Alfonso’s teenage daughter uses her computer to create and send work to school.

Describe three other ways she could make appropriate use of the internet.

1. Watching videos on the internet

2. Book tickets

3. Read books online

 

[3]

(c)

11

Describe a strategy that Alfonso’s daughter could use to back up her school work.

She can back up her school work by copying onto removable storage medium

(d)

and make incremental backups

[2]

The bank that Alfonso uses only requires customers to log into their account by inputting a user id and password.

Explain why this is not very secure and discuss other ways the bank could identify the customer securely.

User ID and password can easily be guessed and accessed in easily. Passwords

can be hacked with key logging software. In order to raise security of the bank,

they can ask to us a retina scanner to detect retina pattern. They can also ask for

the account's owner birth date. Use Finger scanner because everyone's fingerprint

is not the same. Biometrics are nearly impossible to forge

© UCLES 2015

06_0417_11_2015_1.14

[6]

[Turn Over

12

13 Ahmed has asked Anna, a systems analyst, to create a new database system for his video rental business. He rents out films in DVD and Blu-ray formats only. Here are some of the questions customers ask:

1.

2.

3.

(a)

Do you have the film ‘Muppets most wanted’ in Blu-ray format?

Do you have any films which I can rent for less than $3?

Do you have any films directed by Stephen Spielberg?

Complete the design table below by filling in the field names and data types. Use the most appropriate data type to create a database which would answer the questions shown above. Do not use spaces in field names.

Field name

Data type

Film_title

Alphanumeric

Format/Blu-Ray/DVD

Booleen

Rental Cost

Currency

Name_of_director

Text

(b)

[6]

Describe how Ahmed would use the finished database to produce a report, without using word processing software, to answer the second question above.

Set up header

Set up footer

Set up a query

select appropriate fields to include in report

[4]

13

14 A lending library has introduced an e-book borrowing facility. Borrowers will be able to download a book to their tablet computer or e-book reader. It will automatically remove itself from the device after the loan period has expired.

Discuss the advantages and disadvantages of such a system to the library and the borrower.

Advatages of borrowers are:

Saves cost of travelling to the library

Will not be fined for going over borrowing period

Disadvantages of borrowers are:

Might not have finished reading book when it disappears

Advantages of Library

Librarians will have more time to spend on other duties

Don’t have to worry about books not being returned

Disadvantanges:

Will lose income from not collecting fines

[6]

14

BLANK PAGE

15

BLANK PAGE

16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the pub lisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridg e International Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge L ocal Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.