0% found this document useful (0 votes)
60 views

Examiner Report Paper 1

Examiner report Paper 1

Uploaded by

Arjun Karki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views

Examiner Report Paper 1

Examiner report Paper 1

Uploaded by

Arjun Karki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Example Responses – Paper 1

Cambridge IGCSE™ / IGCSE (9–1)


Computer Science 0478 / 0984
Cambridge O Level
Computer Science 2210
For examination from 2023
© Cambridge University Press & Assessment 2023 v1
Cambridge Assessment International Education is part of Cambridge University Press & Assessment. Cambridge
University Press & Assessment is a department of the University of Cambridge.
Cambridge University Press & Assessment retains the copyright on all its publications. Registered centres are
permitted to copy material from this booklet for their own internal use. However, we cannot give permission to centres
to photocopy any material that is acknowledged to a third party even for internal use within a centre.
Contents
Introduction........................................................................................................................................................................4
Question 1.........................................................................................................................................................................5
Question 2.........................................................................................................................................................................6
Question 3.........................................................................................................................................................................8
Question 4.......................................................................................................................................................................10
Question 5.......................................................................................................................................................................12
Question 6.......................................................................................................................................................................14
Question 7.......................................................................................................................................................................16
Question 8.......................................................................................................................................................................18
Question 9.......................................................................................................................................................................19
Question 10.....................................................................................................................................................................20
Example Responses – Paper 1

Introduction
The main aim of this booklet is to exemplify standards for those teaching Cambridge IGCSE / IGCSE (9-1) / O Level
Information and Communication Technology 0478 / 0984 / 2210.
This booklet contains responses to all questions from June 2023 Paper 12, which have been written by a Cambridge
examiner. Responses are accompanied by a brief commentary highlighting common errors and misconceptions where
they are relevant.
The question papers and mark schemes are available to download from the School Support Hub

0478 / 0984 / 2210 June 2023 Question Paper 12


0478 / 0984 / 2210 June 2023 Mark Scheme 12

Past exam resources and other teaching and learning resources are available from the School Support Hub

4
Example Responses – Paper 1

Question 1
2

1 Output devices are used to output data from a computer.

Circle three devices that are output devices.

actuator digital versatile disk (DVD) keyboard

microphone mouse printer scanner

sensor solid‑state drive (SSD) speaker


[3]

2 Binary numbers can be converted to hexadecimal.


Examiner comment
• Some(a)
candidates the two
Convertthought binary
that numberswas
a microphone to hexadecimal.
an output device.
• Candidates often did not recognise an actuator as an output device.
10010011 ..................................................................................................................................

00001101 ..................................................................................................................................
[4]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) A value is stored as a binary number in a register.

0 1 1 1 1 0 1 0

A logical right shift of three places is performed on the binary number.

(i) Complete the binary register to show its contents after this logical right shift.

[1]

(ii) State one effect this logical shift has on the binary number.

...........................................................................................................................................

..................................................................................................................................... [1]
5
1 microphone
Output devices are used to outputmouse
data from a computer. printer scanner
actuator digital versatile disk (DVD) keyboard
Example Responses
Circle three– devices
Paper 1 that are output devices.
sensor solid‑state drive (SSD) speaker
microphone mouse printer scanner
actuator digital versatile disk (DVD) keyboard [3]

Question
2 2 sensor
Binary numbers can be converted to solid‑state
hexadecimal.drive (SSD) speaker
microphone mouse printer scanner
(a) Convert the two binary numbers to hexadecimal. [3]

2 Binary numbers..................................................................................................................................
10010011 can be converted to solid‑state
sensor hexadecimal. drive (SSD) speaker

(a) Convert two binary numbers to hexadecimal. [3]


the..................................................................................................................................
00001101
2 Binary 93 [4]
numbers..................................................................................................................................
can be converted to hexadecimal.
10010011
Working the
(a) 00001101
Convert space
OD
two binary numbers to hexadecimal.
..................................................................................................................................
[4]
...................................................................................................................................................
10010011 ..................................................................................................................................
Examiner comment
Working space
...................................................................................................................................................
00001101 ..................................................................................................................................
Some candidates did not convert all parts of the binary number to hexadecimal. If part of the binary number converted [4]
...................................................................................................................................................
...................................................................................................................................................
to a 0, candidates should still show this in their answer.
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(b) A value is stored as a binary number in a register.
...................................................................................................................................................
...................................................................................................................................................
0 1 1 1 1 0 1 0
...................................................................................................................................................
(b) A value is stored as a binary number in a register.

...................................................................................................................................................
A logical right shift of three places is performed on the binary number.
0 1 1 1 1 0 1 0
(b) A
(i)value is stored
Complete theasbinary
a binary number
register in a register.
to show its contents after this logical right shift.
A logical right shift of three places is performed on the binary number.
00 01 01 01 1
1 0
1 1
1 0
1
(i) Complete the binary register to show its contents after this logical right shift.
[1]
A logical right shift of three places is performed on the binary number.
Examiner (ii) comment
State one effect this logical shift has on the binary number.
(i) Complete the binary register to show its contents after this logical right shift.
Candidates sometimes shifted the values into the register from the right-hand side, instead of shifting each value [1]to
...........................................................................................................................................
the right the required number of places. In this question, this resulted in the incorrect answer of 11010000. This was
performing a logical
(ii) Stateleft one
shift effect
of threethisplaces,
logicalinstead
shift of
hasa right
on theshift.
binary number.
..................................................................................................................................... [1]
[1]
...........................................................................................................................................

(ii) State one effect this logical shift has on the binary number.
..................................................................................................................................... [1]

© UCLES 2023 the value is divided by 8,0478/12/M/J/23 but this makes the value inaccurate
...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2023 0478/12/M/J/23

Examiner comment
Candidates often just provided a vague statement that the value increased, decreased or changed. More detail
needed to 2023
© UCLES be provided than this to demonstrated the0478/12/M/J/23
amount that the value was divided or multiplied by.

6
Example Responses – Paper 1

(c) Give two reasons why a programmer may use hexadecimal to represent binary numbers.

hexadecimal numbers take up less space on a screen than binary


1 ................................................................................................................................................

numbers
...................................................................................................................................................

it is easier for the programmer to find mistakes in the program


2 ................................................................................................................................................
3
...................................................................................................................................................
(c) Give two reasons why a programmer may use hexadecimal to represent binary numbers. [2]

Examiner comment
(d) Denary numbers can also be converted to hexadecimal.
1 ................................................................................................................................................
• Some candidates did not provide an accurate answer when referring to screen space in this question. Sometimes,
Convert
they wrote the denary
a statement that was number
too vague, to hexadecimal.
...................................................................................................................................................
stating that it takes up less space, but not stating where less space
was taken.
• 301
Candidates ......................................................................................................................................
also had a misconception regarding space. They often stated that hexadecimal takes up less storage [2]
2 ................................................................................................................................................
space, but this was not correct as hexadecimal is stored as binary.
Working space
...................................................................................................................................................
[2]
...................................................................................................................................................
(d) Denary numbers can also be converted to hexadecimal.
...................................................................................................................................................
Convert the denary number to hexadecimal.
...................................................................................................................................................
12D
301 ...................................................................................................................................... [2]
...................................................................................................................................................
Working space
Examiner comment
...................................................................................................................................................
Candidates often struggled to convert denary to hexadecimal. Candidates could convert the denary to binary first, then
convert the binary to hexadecimal.
...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2023 0478/12/M/J/23


7
[Turn over
Example Responses – Paper 1

Question 3
4

3 When keys are pressed on a keyboard, the text is converted to binary to be processed by the
computer.

(a) Describe how the text is converted to binary to be processed by the computer.

When text is converted to binary, an ASCII character set can be


...................................................................................................................................................
4
used. Each character has a unique binary value that the character is
...................................................................................................................................................
3 When keys are pressed on a keyboard, the text is converted to binary to be processed by the
computer.
converted to.
...................................................................................................................................................
(a) Describe how the text is converted to binary to be processed by the computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
...................................................................................................................................................
(b) Text that is input into a computer can be stored in a text file.
Examiner comment
...................................................................................................................................................
A text file can be compressed using lossless compression.
When text is converted to binary, an ASCII character set can be used. Each character has a unique binary value that
...................................................................................................................................................
the character is converted to.
(i) State what effect this has on the file size.
............................................................................................................................................. [3]
...........................................................................................................................................
(b) Text that is input into a computer can be stored in a text file.
..................................................................................................................................... [1]
A text file can be compressed using lossless compression.
(ii) Describe how lossless compression compresses the text file.
(i) State what effect this has on the file size.
...........................................................................................................................................
the effect that this has on the file size is that it reduces it
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
(ii) Describe how lossless compression compresses the text file.
...........................................................................................................................................
Examiner comment
...........................................................................................................................................
Candidates sometimes inaccurately stated that the size of the data was reduced, but it was the size of the file that was
...........................................................................................................................................
reduced.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
...........................................................................................................................................
(iii) Give two reasons why the text file may have been compressed.
...........................................................................................................................................
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
2 ........................................................................................................................................
(iii) Give two reasons why the text file may8 have been compressed.
...........................................................................................................................................
[2]
(i) State what effect this has on the file size.
...................................................................................................................................................

...........................................................................................................................................
...................................................................................................................................................
Example Responses – Paper 1

..................................................................................................................................... [3]
............................................................................................................................................. [1]

(ii) that
(b) Text Describe how
is input intolossless compression
a computer compresses
can be stored in a textthe
file.text file.
A compression algorithm is used to find repeated words in the text.
A text ...........................................................................................................................................
file can be compressed using lossless compression.

(i)
Each
State
different word is indexed into a table. This records the word
...........................................................................................................................................
what effect this has on the file size.
and the positions where it occurs in the text.
...........................................................................................................................................
...........................................................................................................................................

...........................................................................................................................................
..................................................................................................................................... [1]

(ii) ...........................................................................................................................................
Describe how lossless compression compresses the text file.

...........................................................................................................................................
...........................................................................................................................................

...........................................................................................................................................
...........................................................................................................................................

..................................................................................................................................... [4]
...........................................................................................................................................

(iii) ...........................................................................................................................................
Give two reasons why the text file may have been compressed.
Examiner comment
• Many candidates 1 ........................................................................................................................................
...........................................................................................................................................
found it challenging to be detailed and accurate in their response.
• Candidates also struggled to apply the question to the context given. Some candidates referred to repeating
...........................................................................................................................................
...........................................................................................................................................
pixels, rather than repeating characters. Pixels would be relevant to an image file, but not a text file. Candidates
were vague when referring to the elements they listed as repeating, using terms such as ‘repeating values’ and
2 These
........................................................................................................................................
...........................................................................................................................................
‘repeating data’. terms were not specific enough for the context given.

...........................................................................................................................................
..................................................................................................................................... [4]
[2]
(iii) Give two reasons why the text file may have been compressed.
© UCLES 2023 0478/12/M/J/23
it will take up less storage space
1 ........................................................................................................................................

...........................................................................................................................................

it will be faster to transmit from one device to another


2 ........................................................................................................................................

...........................................................................................................................................
[2]

Examiner
© UCLES 2023
comment 0478/12/M/J/23
• Candidates sometimes stated that a compressed text file took up less space, but they did not give enough detail
about where the space would be saved.
• Some candidates gave repeated reasons that drew on the same knowledge. They stated that it was faster to
upload the file, then stated that it would be faster to download the file. Both these statements related to it being
quicker to transmit the file.

9
Example Responses – Paper 1

Question 4
5

4 A student uses a mobile phone to take photographs for a school project.

The student needs to transmit the photographs to their computer. They could use serial data
transmission or parallel data transmission to transmit the photographs.

(a) (i) Describe how the photographs would be transmitted using serial data transmission.

the photographs would be transmitted one bit at a time down a single


...........................................................................................................................................
5
wire
4 A student ...........................................................................................................................................
uses a mobile phone to take photographs for a school project.
...........................................................................................................................................
The student needs to transmit the photographs to their computer. They could use serial data
transmission or parallel data transmission to transmit the photographs.
..................................................................................................................................... [2]
(a) (i) Describe how the photographs would be transmitted using serial data transmission.
(ii) Give two benefits of transmitting the photographs using serial data transmission.
Examiner comment
...........................................................................................................................................
• 1 ........................................................................................................................................
Some candidates inaccurately stated that the data was sent one at a time, but they did not provide specific detail
about the data...........................................................................................................................................
or refer to transmission bit by bit.

...........................................................................................................................................
Some candidates inaccurately referred to a single wire as a cable. A cable can contain multiple wires, so answers
needed to refer...........................................................................................................................................
to a wire and not a cable.
2 ........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
(ii) Give two benefits of transmitting the photographs using serial data transmission. [2]

(iii) there
State one will
benefit beofless the chance
student using of error parallel in data
the transmission
data as there insteadis less
of serial data
1 ........................................................................................................................................
transmission.
interference
...........................................................................................................................................
...........................................................................................................................................
the data is sent bit by bit so it will not be skewed
2 ........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
(b) The photographs are also transmitted across a network to cloud storage. A device on the [2]
network forwards the data towards its correct destination.
Examiner
(iii) comment
State one benefit of the student using parallel data transmission instead of serial data
(i) State the name of this device.
transmission.
• Candidates often referred to serial being more suitable to send the data over a long distance. In this instance this
was not relevant to the context given. Candidates needed to note the context given in the question and tailor their
..................................................................................................................................... [1]
...........................................................................................................................................
answer to the context. The context did not state that long distance was involved.
• Candidates
(ii) sometimes
Describe referred
what is to the cost
meant by being
cloudcheaper
storage.for serial transmission, however the difference in cost
between the two .....................................................................................................................................
types of transmission is negligible. Candidates needed to focus on the other benefits. [1]
...........................................................................................................................................
(b) The photographs are also transmitted across a network to cloud storage. A device on the
network forwards the data towards its correct destination.
...........................................................................................................................................
(i) State the name of this device.
...........................................................................................................................................
..................................................................................................................................... [1]
..................................................................................................................................... [2]
(ii) Describe what is meant by cloud storage.
(iii) Give one disadvantage of storing the photographs in cloud storage instead of storing
them locally.
...........................................................................................................................................
...........................................................................................................................................
10
...........................................................................................................................................
...........................................................................................................................................
(a) (i) 2Describe how the photographs would be transmitted using serial data transmission.
........................................................................................................................................
..................................................................................................................................... [2]
Example Responses – Paper 1
...........................................................................................................................................
(ii) Give two benefits of transmitting the photographs using serial data transmission.
[2]
...........................................................................................................................................
1 ........................................................................................................................................
(iii) State one benefit of the student using parallel data transmission instead of serial data
...........................................................................................................................................
transmission.
...........................................................................................................................................
using parallel transmission would mean the data can be transmitted
..................................................................................................................................... [2]
...........................................................................................................................................
2 ........................................................................................................................................
faster
(ii)
Give two benefits of transmitting the photographs using serial data transmission.
..................................................................................................................................... [1]
...........................................................................................................................................
[2]
1 ........................................................................................................................................
(b) The photographs are also transmitted across a network to cloud storage. A device on the
Examiner comment
network forwards the data towards its correct destination.
(iii) State one benefit of the student using parallel data transmission instead of serial data
...........................................................................................................................................
transmission.
Candidates sometimes stated that the data could be transmitted fast. Their answer needed to be a comparison
(i) State the name of this device.
between the two types of data transmission. When they referred to ‘fast’ transmission, this was not a comparison, so
2 ........................................................................................................................................
...........................................................................................................................................
their answer needed to state that it was a ‘faster’ transmission.
..................................................................................................................................... [1]
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Describe what is meant by cloud storage. [2]
(b) The photographs are also transmitted across a network to cloud storage. A device on the
(iii) State one benefit of the student using parallel data transmission instead of serial data
...........................................................................................................................................
network forwards the data towards its correct destination.
transmission.
...........................................................................................................................................
(i) State the name of this device.
...........................................................................................................................................
router
...........................................................................................................................................
..................................................................................................................................... [1]
..................................................................................................................................... [1]
..................................................................................................................................... [2]
(ii) Describe what is meant by cloud storage.
(b) The photographs are also transmitted across a network to cloud storage. A device on the
(iii) Cloud
network
Give onestorage
forwards the data
disadvantage is storage
towards itsand
of storing theisphotographs
correct adestination.
group ofinservers cloud storagethat instead
are stored in
of storing
...........................................................................................................................................
them locally.
(i) State
a remotethe name location. The servers store data that is accessed using an
of this device.
...........................................................................................................................................
...........................................................................................................................................
.....................................................................................................................................
internet connection. [1]
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Describe what is meant by cloud storage. [Turn over
© UCLES 2023 .....................................................................................................................................
0478/12/M/J/23 [2]
...........................................................................................................................................
(iii) Give one disadvantage of storing the photographs in cloud storage instead of storing
Examiner comment
them locally.
...........................................................................................................................................
Some candidates believed that there is no physical hardware storing data in the cloud. They thought it is stored
...........................................................................................................................................
virtually somehow,...........................................................................................................................................
but did not understand that it is stored on physical servers.

..................................................................................................................................... [1]
..................................................................................................................................... [2]
© UCLES 2023 0478/12/M/J/23 [Turn over
(iii) Give one disadvantage of storing the photographs in cloud storage instead of storing
them locally.

if the user loses their internet connection, they will lose access to
...........................................................................................................................................

the data that is stored in the cloud


..................................................................................................................................... [1]
© UCLES 2023 0478/12/M/J/23 [Turn over
Examiner comment
Some candidates referred to data stored in the cloud being easy to hack. This statement was vague and inaccurate.
Data stored locally can be easy to hack, whereas data stored in the cloud is likely to have a lot more security placed
on it, so it is not easy to hack. Candidates could refer to the possibility that there may be security risks.

11
Example Responses – Paper 1

Question 5
6

5 A programmer writes a computer program using a high‑level language.

(a) Tick (3) one box to show which statement is correct about writing computer programs in a
high‑level language.
6
A Mnemonics are used to create instructions.
5 A programmer writes a computer program using a high‑level language.
B The computer program is harder to debug than a low‑level language program.
(a) Tick (3) one box to show which statement is correct about writing computer programs in a
high‑level language.
C The computer program is machine independent. 
A Mnemonics are used to create instructions.
D The hardware of the computer can be directly manipulated.
B The computer program is harder to debug than a low‑level language program. [1]
Examiner comment
C programmer
(b) The The computer program
uses is machine
a compiler independent.
to translate the computer program.
Some candidates had a misconception that high-level language is more complex to program than low-level language.
Therefore, some candidateshow
(i) Describe incorrectly chose option
the compiler B, that
translates thethecomputer
computerprogram.
program is harder to debug.
D The hardware of the computer can be directly manipulated.
[1]
...........................................................................................................................................

(b) The programmer uses a compiler to translate the computer program.


...........................................................................................................................................

(i) Describe how the compiler translates the computer program.


...........................................................................................................................................

The compiler translates all the program code to machine code at


...........................................................................................................................................

once before it is then executed. It also creates an executable file for


...........................................................................................................................................

the code.
...........................................................................................................................................
..................................................................................................................................... [3]

(ii) ...........................................................................................................................................
Describe how the compiler reports errors.

...........................................................................................................................................

..................................................................................................................................... [3]
...........................................................................................................................................

(ii) Describe how the compiler reports errors.


...........................................................................................................................................
Examiner comment
• Some candidates...........................................................................................................................................
.....................................................................................................................................
gave vague statements about the translation process of a compiler and they stated that all[2] the
code is translated at once. This was vague as an interpreter translates all the code too, it just translates a line at a
time(c)
thenThe ...........................................................................................................................................
programmer
executes it. uses an integrated development environment (IDE) to create the computer
• program.
Candidates needed to provide extra detail and accuracy that all the code is translated before it is executed. This
would provide ...........................................................................................................................................
a clear distinction between the operation of a compiler and an interpreter.
One function of the IDE is that it has the built‑in compiler.
..................................................................................................................................... [2]
Give three other common functions of an IDE.
(c) The programmer uses an integrated development environment (IDE) to create the computer
program.
1 ................................................................................................................................................

One function of the IDE is that it has the built‑in compiler.


2 ................................................................................................................................................

Give three other common functions of an IDE.


3 ................................................................................................................................................
12
[3]
...........................................................................................................................................
(i) Describe how the compiler translates the computer program.
...........................................................................................................................................
Example Responses – Paper 1
...........................................................................................................................................
..................................................................................................................................... [3]
...........................................................................................................................................
(ii) Describe how the compiler reports errors.
...........................................................................................................................................
The compiler creates a report that shows all the errors in the code.
...........................................................................................................................................
...........................................................................................................................................
The report is displayed after the program has tried to compile.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
..................................................................................................................................... [2]
(ii) Describe how the compiler reports errors.
(c) The programmer uses an integrated development environment (IDE) to create the computer
Examiner comment
program.
...........................................................................................................................................
• Some candidates stated that the report is created before the code is executed. This was inaccurate as the code
would notOne function
be executed ifofthere
the IDE is that it has the built‑in compiler.
...........................................................................................................................................
are errors.
• Candidates needed to be precise and technically accurate in their responses. This is very important where
questionsGive three
them other common
to describe functionsprocess.
a technical of an IDE.
...........................................................................................................................................
require

1 ................................................................................................................................................
..................................................................................................................................... [2]

(c) 2 ................................................................................................................................................
The programmer uses an integrated development environment (IDE) to create the computer
program.
3 ................................................................................................................................................
One function of the IDE is that it has the built‑in compiler. [3]

Give three other common functions of an IDE.


© UCLES 2023 0478/12/M/J/23

auto-completion
1 ................................................................................................................................................

auto-correction
2 ................................................................................................................................................

prettyprint
3 ................................................................................................................................................
[3]

Examiner comment
© UCLES 2023 0478/12/M/J/23
• Candidates sometimes gave a description of a function instead of naming it. Responses such as highlighting
syntax in different colours was an acceptable alternative to naming the function. Some candidates gave the ‘built-in
translator’.
• Candidates needed to give additional functions to those given in the question. A compiler is a type of translator, so
this was a repeat of the question.

13
Example Responses – Paper 1

Question 6
7

6 (a) Complete the statements about cookies.

Use the terms from the list.

Some of the terms in the list will not be used. Some terms may be used more than once.

compression executable hypertext markup language (HTML)

hypertext transfer protocol (HTTP) image internet protocol (IP) address

persistent session sound text

uniform resource locater (URL) web browser web server

text
Cookies are small ........................................................... files that are sent between a
web browser
........................................................... web server
and a ........................................................... .
session
........................................................... cookies are stored in memory and not in the user’s

secondary storage.

session
When the web browser is closed a ........................................................... cookie is lost,

persisent
whereas a ........................................................... cookie is not lost.
[6]

Examiner comment
(b) Give three functions of a cookie.
Some candidates incorrectly thought that cookies are small executable files.
1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

14
When the web browser is closed a ........................................................... cookie is lost,
Example Responses – Paper 1
whereas a ........................................................... cookie is not lost.
[6]

(b) Give three functions of a cookie.

storing user preferences on how a website is displayed


1 ................................................................................................................................................

saving items in a virtual shopping cart


2 ................................................................................................................................................

storing login details so they do not need to be entered each time


3 ................................................................................................................................................
[3]

Examiner comment
Some candidates gave vague statements such as ‘storing user history’. This is more a function of a web browser and
too vague for a use of a cookie. Candidates needed to be more specific about what is stored in the cookie than just
the user's history.

© UCLES 2023 0478/12/M/J/23 [Turn over

15
Example Responses – Paper 1

Question 7
8

7 A distributed denial of service attack (DDoS) is a cyber security threat.

(a) Draw and annotate a diagram to represent the process of a DDoS.

millions of requests
sent to web server
bot

botnet bot web server X user

bot the web server gets too many


requests at the same time that
they cause it to crash, meaning
users open a file
legitimate requests from users
that downloads
cannot get through
malware onto their
computers turning
them into a bot

Examiner comment
Candidates found this question challenging and sometimes focused on producing an elaborate drawing instead of
keeping their diagrams simple and concise. Candidates needed to maintain the level of accuracy in their annotations
that they would havein a written response to the question.

(b) State two aims of carrying out a DDoS attack.

to stop people accessing the web server and demand a ransom for
1 ................................................................................................................................................

the attack to stop


...................................................................................................................................................

to affect a company’s reputation because people believe they are


2 ................................................................................................................................................

doing bad things


...................................................................................................................................................
[2]

Examiner comment
(c) Give two security solutions that can be used to help prevent a DDoS attack being successful.
Some candidates incorrectly thought that a DDoS damages or deletes data. It can prevent access to the data that is
1 ................................................................................................................................................
stored on the web server, but it will not directly damage or delete it.

...................................................................................................................................................

16
2 ................................................................................................................................................
2 ................................................................................................................................................
Example Responses – Paper 1
...................................................................................................................................................
[2]

(c) Give two security solutions that can be used to help prevent a DDoS attack being successful.

proxy server
1 ................................................................................................................................................

...................................................................................................................................................

firewall
2 ................................................................................................................................................

...................................................................................................................................................
[2]

Examiner comment
8 A computer is connected to a network and assigned an IPv4 address.
Some candidates incorrectly thought that using antivirus software and setting strong passwords would prevent a
DDoS from being successful.
(a) Tick (3) one box to show which device would assign the IPv4 address to the computer.

A Domain name server (DNS)

B Network interface card (NIC)

C Router

D Web server
[1]

(b) Describe the characteristics of an IPv4 address.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2023 0478/12/M/J/23 [Turn over

17
...................................................................................................................................................
1 ................................................................................................................................................
[2]
Example Responses – Paper 1
...................................................................................................................................................
(c) Give two security solutions that can be used to help prevent a DDoS attack being successful.
2 ................................................................................................................................................
1 ................................................................................................................................................
Question 8 ...................................................................................................................................................
...................................................................................................................................................
[2]

2 ................................................................................................................................................
8 A computer is connected to a network and assigned an IPv4 address.
...................................................................................................................................................
(a) Tick (3) one box to show which device would assign the IPv4 address to the computer. [2]

A Domain name server (DNS)


8 A computer is connected to a network and assigned an IPv4 address.
B Network interface card (NIC)
(a) Tick (3) one box to show which device would assign the IPv4 address to the computer.

C
A Router
Domain name server (DNS) 

D
B Web server
Network interface card (NIC)
[1]
C Router
Examiner comment
(b) Describe the characteristics of an IPv4 address.
Some candidates incorrectly thouht that a DNS assigns an IP address.
D Web server
...................................................................................................................................................
[1]
...................................................................................................................................................
(b) Describe the characteristics of an IPv4 address.
...................................................................................................................................................
An IPv4 address is an IP address that uses only denary numbers. It is
...................................................................................................................................................
...................................................................................................................................................
a 32-bit address that has four groups of numbers that are separated
...................................................................................................................................................
...................................................................................................................................................
by dots.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
...................................................................................................................................................

© UCLES 2023 0478/12/M/J/23 [Turn over


...................................................................................................................................................

............................................................................................................................................. [4]

Examiner
© UCLES 2023 comment 0478/12/M/J/23 [Turn over
Some candidates just described the characteristics of a general IP address and did not tailor this to being an IPv4
address. They gave generic characteristics such as that it can be static or dynamic. Having some generic points in
their answer was acceptable, but they needed to include points specific to IPv4.

18
Example Responses – Paper 1

Question 9
10

9 One component of an expert system is the inference engine.

(a) Identify the three other components in an expert system.


10
user interface
1 ................................................................................................................................................
9 One component of an expert system is the inference engine.
knowledge base
2 ................................................................................................................................................
(a) Identify the three other components in an expert system.
rule base
3 ................................................................................................................................................
[3]
1 ................................................................................................................................................

Examiner comment
(b) Describe the role of the inference engine in an expert system.
2 ................................................................................................................................................
Some candidates gave general components of a computer system, but these were not specific to an expert system.
...................................................................................................................................................
3 ................................................................................................................................................
[3]
...................................................................................................................................................
(b) Describe the role of the inference engine in an expert system.
...................................................................................................................................................
The inference engine makes decisions to solve a problem or provide
...................................................................................................................................................
............................................................................................................................................. [2]
a diagnosis. It does this by using the facts in the knowledge base and
...................................................................................................................................................

applying these to the rules in the rule base.


...................................................................................................................................................

............................................................................................................................................. [2]

Examiner comment
Many candidates found it difficult to provide the required level of technical detail for this question. Many did not refer to
how the inference engine interacts with the other components in the expert system to perform its role.

19
Example Responses – Paper 1

Question 10
11

10 A user has both system software and application software installed on their computer.

(a) Describe the difference between system software and application software.

Give an example of each software in your answer.

System software is software that a computer needs to run


...................................................................................................................................................
11
effectively as it helps maintain the computer. An example of system
...................................................................................................................................................
10 A user has both system software and application software installed on their computer.
software is an antivirus program.
...................................................................................................................................................
(a) Describe the difference between system software and application software.
Application software allows the user to perform tasks on the
...................................................................................................................................................
Give an example of each software in your answer.
computer and provides services for the user. An example of
...................................................................................................................................................
...................................................................................................................................................
application software is a web browser.
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
...................................................................................................................................................
(b) State which component in the computer would store both types of software when the power is
...................................................................................................................................................
Examiner comment
turned off.
• Candidates found it challenging to distinguish the difference between system software and application software.
...................................................................................................................................................
.............................................................................................................................................
They needed to clearly demonstrate the difference between the two. [1]
• Some candidates gave brand names as examples of the software, but these could not be accepted.
...................................................................................................................................................

............................................................................................................................................. [4]

(b) State which component in the computer would store both types of software when the power is
turned off.

secondary storage
............................................................................................................................................. [1]

Examiner comment
Some candidates incorrectly thought that both system software and application software will be stored in ROM.

20
Cambridge Assessment International Education
The Triangle Building, Shaftesbury Road, Cambridge, CB2 8EA, United Kingdom
t: +44 1223 553554
e: [email protected] www.cambridgeinternational.org

© Cambridge University Press & Assessment 2023 v1

You might also like