Examiner Report Paper 1
Examiner Report Paper 1
Introduction
The main aim of this booklet is to exemplify standards for those teaching Cambridge IGCSE / IGCSE (9-1) / O Level
Information and Communication Technology 0478 / 0984 / 2210.
This booklet contains responses to all questions from June 2023 Paper 12, which have been written by a Cambridge
examiner. Responses are accompanied by a brief commentary highlighting common errors and misconceptions where
they are relevant.
The question papers and mark schemes are available to download from the School Support Hub
Past exam resources and other teaching and learning resources are available from the School Support Hub
4
Example Responses – Paper 1
Question 1
2
00001101 ..................................................................................................................................
[4]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
0 1 1 1 1 0 1 0
(i) Complete the binary register to show its contents after this logical right shift.
[1]
(ii) State one effect this logical shift has on the binary number.
...........................................................................................................................................
..................................................................................................................................... [1]
5
1 microphone
Output devices are used to outputmouse
data from a computer. printer scanner
actuator digital versatile disk (DVD) keyboard
Example Responses
Circle three– devices
Paper 1 that are output devices.
sensor solid‑state drive (SSD) speaker
microphone mouse printer scanner
actuator digital versatile disk (DVD) keyboard [3]
Question
2 2 sensor
Binary numbers can be converted to solid‑state
hexadecimal.drive (SSD) speaker
microphone mouse printer scanner
(a) Convert the two binary numbers to hexadecimal. [3]
2 Binary numbers..................................................................................................................................
10010011 can be converted to solid‑state
sensor hexadecimal. drive (SSD) speaker
...................................................................................................................................................
A logical right shift of three places is performed on the binary number.
0 1 1 1 1 0 1 0
(b) A
(i)value is stored
Complete theasbinary
a binary number
register in a register.
to show its contents after this logical right shift.
A logical right shift of three places is performed on the binary number.
00 01 01 01 1
1 0
1 1
1 0
1
(i) Complete the binary register to show its contents after this logical right shift.
[1]
A logical right shift of three places is performed on the binary number.
Examiner (ii) comment
State one effect this logical shift has on the binary number.
(i) Complete the binary register to show its contents after this logical right shift.
Candidates sometimes shifted the values into the register from the right-hand side, instead of shifting each value [1]to
...........................................................................................................................................
the right the required number of places. In this question, this resulted in the incorrect answer of 11010000. This was
performing a logical
(ii) Stateleft one
shift effect
of threethisplaces,
logicalinstead
shift of
hasa right
on theshift.
binary number.
..................................................................................................................................... [1]
[1]
...........................................................................................................................................
(ii) State one effect this logical shift has on the binary number.
..................................................................................................................................... [1]
© UCLES 2023 the value is divided by 8,0478/12/M/J/23 but this makes the value inaccurate
...........................................................................................................................................
..................................................................................................................................... [1]
Examiner comment
Candidates often just provided a vague statement that the value increased, decreased or changed. More detail
needed to 2023
© UCLES be provided than this to demonstrated the0478/12/M/J/23
amount that the value was divided or multiplied by.
6
Example Responses – Paper 1
(c) Give two reasons why a programmer may use hexadecimal to represent binary numbers.
numbers
...................................................................................................................................................
Examiner comment
(d) Denary numbers can also be converted to hexadecimal.
1 ................................................................................................................................................
• Some candidates did not provide an accurate answer when referring to screen space in this question. Sometimes,
Convert
they wrote the denary
a statement that was number
too vague, to hexadecimal.
...................................................................................................................................................
stating that it takes up less space, but not stating where less space
was taken.
• 301
Candidates ......................................................................................................................................
also had a misconception regarding space. They often stated that hexadecimal takes up less storage [2]
2 ................................................................................................................................................
space, but this was not correct as hexadecimal is stored as binary.
Working space
...................................................................................................................................................
[2]
...................................................................................................................................................
(d) Denary numbers can also be converted to hexadecimal.
...................................................................................................................................................
Convert the denary number to hexadecimal.
...................................................................................................................................................
12D
301 ...................................................................................................................................... [2]
...................................................................................................................................................
Working space
Examiner comment
...................................................................................................................................................
Candidates often struggled to convert denary to hexadecimal. Candidates could convert the denary to binary first, then
convert the binary to hexadecimal.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Question 3
4
3 When keys are pressed on a keyboard, the text is converted to binary to be processed by the
computer.
(a) Describe how the text is converted to binary to be processed by the computer.
...........................................................................................................................................
...................................................................................................................................................
Example Responses – Paper 1
..................................................................................................................................... [3]
............................................................................................................................................. [1]
(ii) that
(b) Text Describe how
is input intolossless compression
a computer compresses
can be stored in a textthe
file.text file.
A compression algorithm is used to find repeated words in the text.
A text ...........................................................................................................................................
file can be compressed using lossless compression.
(i)
Each
State
different word is indexed into a table. This records the word
...........................................................................................................................................
what effect this has on the file size.
and the positions where it occurs in the text.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) ...........................................................................................................................................
Describe how lossless compression compresses the text file.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
...........................................................................................................................................
(iii) ...........................................................................................................................................
Give two reasons why the text file may have been compressed.
Examiner comment
• Many candidates 1 ........................................................................................................................................
...........................................................................................................................................
found it challenging to be detailed and accurate in their response.
• Candidates also struggled to apply the question to the context given. Some candidates referred to repeating
...........................................................................................................................................
...........................................................................................................................................
pixels, rather than repeating characters. Pixels would be relevant to an image file, but not a text file. Candidates
were vague when referring to the elements they listed as repeating, using terms such as ‘repeating values’ and
2 These
........................................................................................................................................
...........................................................................................................................................
‘repeating data’. terms were not specific enough for the context given.
...........................................................................................................................................
..................................................................................................................................... [4]
[2]
(iii) Give two reasons why the text file may have been compressed.
© UCLES 2023 0478/12/M/J/23
it will take up less storage space
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
Examiner
© UCLES 2023
comment 0478/12/M/J/23
• Candidates sometimes stated that a compressed text file took up less space, but they did not give enough detail
about where the space would be saved.
• Some candidates gave repeated reasons that drew on the same knowledge. They stated that it was faster to
upload the file, then stated that it would be faster to download the file. Both these statements related to it being
quicker to transmit the file.
9
Example Responses – Paper 1
Question 4
5
The student needs to transmit the photographs to their computer. They could use serial data
transmission or parallel data transmission to transmit the photographs.
(a) (i) Describe how the photographs would be transmitted using serial data transmission.
(iii) there
State one will
benefit beofless the chance
student using of error parallel in data
the transmission
data as there insteadis less
of serial data
1 ........................................................................................................................................
transmission.
interference
...........................................................................................................................................
...........................................................................................................................................
the data is sent bit by bit so it will not be skewed
2 ........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
(b) The photographs are also transmitted across a network to cloud storage. A device on the [2]
network forwards the data towards its correct destination.
Examiner
(iii) comment
State one benefit of the student using parallel data transmission instead of serial data
(i) State the name of this device.
transmission.
• Candidates often referred to serial being more suitable to send the data over a long distance. In this instance this
was not relevant to the context given. Candidates needed to note the context given in the question and tailor their
..................................................................................................................................... [1]
...........................................................................................................................................
answer to the context. The context did not state that long distance was involved.
• Candidates
(ii) sometimes
Describe referred
what is to the cost
meant by being
cloudcheaper
storage.for serial transmission, however the difference in cost
between the two .....................................................................................................................................
types of transmission is negligible. Candidates needed to focus on the other benefits. [1]
...........................................................................................................................................
(b) The photographs are also transmitted across a network to cloud storage. A device on the
network forwards the data towards its correct destination.
...........................................................................................................................................
(i) State the name of this device.
...........................................................................................................................................
..................................................................................................................................... [1]
..................................................................................................................................... [2]
(ii) Describe what is meant by cloud storage.
(iii) Give one disadvantage of storing the photographs in cloud storage instead of storing
them locally.
...........................................................................................................................................
...........................................................................................................................................
10
...........................................................................................................................................
...........................................................................................................................................
(a) (i) 2Describe how the photographs would be transmitted using serial data transmission.
........................................................................................................................................
..................................................................................................................................... [2]
Example Responses – Paper 1
...........................................................................................................................................
(ii) Give two benefits of transmitting the photographs using serial data transmission.
[2]
...........................................................................................................................................
1 ........................................................................................................................................
(iii) State one benefit of the student using parallel data transmission instead of serial data
...........................................................................................................................................
transmission.
...........................................................................................................................................
using parallel transmission would mean the data can be transmitted
..................................................................................................................................... [2]
...........................................................................................................................................
2 ........................................................................................................................................
faster
(ii)
Give two benefits of transmitting the photographs using serial data transmission.
..................................................................................................................................... [1]
...........................................................................................................................................
[2]
1 ........................................................................................................................................
(b) The photographs are also transmitted across a network to cloud storage. A device on the
Examiner comment
network forwards the data towards its correct destination.
(iii) State one benefit of the student using parallel data transmission instead of serial data
...........................................................................................................................................
transmission.
Candidates sometimes stated that the data could be transmitted fast. Their answer needed to be a comparison
(i) State the name of this device.
between the two types of data transmission. When they referred to ‘fast’ transmission, this was not a comparison, so
2 ........................................................................................................................................
...........................................................................................................................................
their answer needed to state that it was a ‘faster’ transmission.
..................................................................................................................................... [1]
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Describe what is meant by cloud storage. [2]
(b) The photographs are also transmitted across a network to cloud storage. A device on the
(iii) State one benefit of the student using parallel data transmission instead of serial data
...........................................................................................................................................
network forwards the data towards its correct destination.
transmission.
...........................................................................................................................................
(i) State the name of this device.
...........................................................................................................................................
router
...........................................................................................................................................
..................................................................................................................................... [1]
..................................................................................................................................... [1]
..................................................................................................................................... [2]
(ii) Describe what is meant by cloud storage.
(b) The photographs are also transmitted across a network to cloud storage. A device on the
(iii) Cloud
network
Give onestorage
forwards the data
disadvantage is storage
towards itsand
of storing theisphotographs
correct adestination.
group ofinservers cloud storagethat instead
are stored in
of storing
...........................................................................................................................................
them locally.
(i) State
a remotethe name location. The servers store data that is accessed using an
of this device.
...........................................................................................................................................
...........................................................................................................................................
.....................................................................................................................................
internet connection. [1]
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Describe what is meant by cloud storage. [Turn over
© UCLES 2023 .....................................................................................................................................
0478/12/M/J/23 [2]
...........................................................................................................................................
(iii) Give one disadvantage of storing the photographs in cloud storage instead of storing
Examiner comment
them locally.
...........................................................................................................................................
Some candidates believed that there is no physical hardware storing data in the cloud. They thought it is stored
...........................................................................................................................................
virtually somehow,...........................................................................................................................................
but did not understand that it is stored on physical servers.
..................................................................................................................................... [1]
..................................................................................................................................... [2]
© UCLES 2023 0478/12/M/J/23 [Turn over
(iii) Give one disadvantage of storing the photographs in cloud storage instead of storing
them locally.
if the user loses their internet connection, they will lose access to
...........................................................................................................................................
11
Example Responses – Paper 1
Question 5
6
(a) Tick (3) one box to show which statement is correct about writing computer programs in a
high‑level language.
6
A Mnemonics are used to create instructions.
5 A programmer writes a computer program using a high‑level language.
B The computer program is harder to debug than a low‑level language program.
(a) Tick (3) one box to show which statement is correct about writing computer programs in a
high‑level language.
C The computer program is machine independent.
A Mnemonics are used to create instructions.
D The hardware of the computer can be directly manipulated.
B The computer program is harder to debug than a low‑level language program. [1]
Examiner comment
C programmer
(b) The The computer program
uses is machine
a compiler independent.
to translate the computer program.
Some candidates had a misconception that high-level language is more complex to program than low-level language.
Therefore, some candidateshow
(i) Describe incorrectly chose option
the compiler B, that
translates thethecomputer
computerprogram.
program is harder to debug.
D The hardware of the computer can be directly manipulated.
[1]
...........................................................................................................................................
the code.
...........................................................................................................................................
..................................................................................................................................... [3]
(ii) ...........................................................................................................................................
Describe how the compiler reports errors.
...........................................................................................................................................
..................................................................................................................................... [3]
...........................................................................................................................................
1 ................................................................................................................................................
..................................................................................................................................... [2]
(c) 2 ................................................................................................................................................
The programmer uses an integrated development environment (IDE) to create the computer
program.
3 ................................................................................................................................................
One function of the IDE is that it has the built‑in compiler. [3]
auto-completion
1 ................................................................................................................................................
auto-correction
2 ................................................................................................................................................
prettyprint
3 ................................................................................................................................................
[3]
Examiner comment
© UCLES 2023 0478/12/M/J/23
• Candidates sometimes gave a description of a function instead of naming it. Responses such as highlighting
syntax in different colours was an acceptable alternative to naming the function. Some candidates gave the ‘built-in
translator’.
• Candidates needed to give additional functions to those given in the question. A compiler is a type of translator, so
this was a repeat of the question.
13
Example Responses – Paper 1
Question 6
7
Some of the terms in the list will not be used. Some terms may be used more than once.
text
Cookies are small ........................................................... files that are sent between a
web browser
........................................................... web server
and a ........................................................... .
session
........................................................... cookies are stored in memory and not in the user’s
secondary storage.
session
When the web browser is closed a ........................................................... cookie is lost,
persisent
whereas a ........................................................... cookie is not lost.
[6]
Examiner comment
(b) Give three functions of a cookie.
Some candidates incorrectly thought that cookies are small executable files.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
14
When the web browser is closed a ........................................................... cookie is lost,
Example Responses – Paper 1
whereas a ........................................................... cookie is not lost.
[6]
Examiner comment
Some candidates gave vague statements such as ‘storing user history’. This is more a function of a web browser and
too vague for a use of a cookie. Candidates needed to be more specific about what is stored in the cookie than just
the user's history.
15
Example Responses – Paper 1
Question 7
8
millions of requests
sent to web server
bot
Examiner comment
Candidates found this question challenging and sometimes focused on producing an elaborate drawing instead of
keeping their diagrams simple and concise. Candidates needed to maintain the level of accuracy in their annotations
that they would havein a written response to the question.
to stop people accessing the web server and demand a ransom for
1 ................................................................................................................................................
Examiner comment
(c) Give two security solutions that can be used to help prevent a DDoS attack being successful.
Some candidates incorrectly thought that a DDoS damages or deletes data. It can prevent access to the data that is
1 ................................................................................................................................................
stored on the web server, but it will not directly damage or delete it.
...................................................................................................................................................
16
2 ................................................................................................................................................
2 ................................................................................................................................................
Example Responses – Paper 1
...................................................................................................................................................
[2]
(c) Give two security solutions that can be used to help prevent a DDoS attack being successful.
proxy server
1 ................................................................................................................................................
...................................................................................................................................................
firewall
2 ................................................................................................................................................
...................................................................................................................................................
[2]
Examiner comment
8 A computer is connected to a network and assigned an IPv4 address.
Some candidates incorrectly thought that using antivirus software and setting strong passwords would prevent a
DDoS from being successful.
(a) Tick (3) one box to show which device would assign the IPv4 address to the computer.
C Router
D Web server
[1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
17
...................................................................................................................................................
1 ................................................................................................................................................
[2]
Example Responses – Paper 1
...................................................................................................................................................
(c) Give two security solutions that can be used to help prevent a DDoS attack being successful.
2 ................................................................................................................................................
1 ................................................................................................................................................
Question 8 ...................................................................................................................................................
...................................................................................................................................................
[2]
2 ................................................................................................................................................
8 A computer is connected to a network and assigned an IPv4 address.
...................................................................................................................................................
(a) Tick (3) one box to show which device would assign the IPv4 address to the computer. [2]
C
A Router
Domain name server (DNS)
D
B Web server
Network interface card (NIC)
[1]
C Router
Examiner comment
(b) Describe the characteristics of an IPv4 address.
Some candidates incorrectly thouht that a DNS assigns an IP address.
D Web server
...................................................................................................................................................
[1]
...................................................................................................................................................
(b) Describe the characteristics of an IPv4 address.
...................................................................................................................................................
An IPv4 address is an IP address that uses only denary numbers. It is
...................................................................................................................................................
...................................................................................................................................................
a 32-bit address that has four groups of numbers that are separated
...................................................................................................................................................
...................................................................................................................................................
by dots.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
...................................................................................................................................................
............................................................................................................................................. [4]
Examiner
© UCLES 2023 comment 0478/12/M/J/23 [Turn over
Some candidates just described the characteristics of a general IP address and did not tailor this to being an IPv4
address. They gave generic characteristics such as that it can be static or dynamic. Having some generic points in
their answer was acceptable, but they needed to include points specific to IPv4.
18
Example Responses – Paper 1
Question 9
10
Examiner comment
(b) Describe the role of the inference engine in an expert system.
2 ................................................................................................................................................
Some candidates gave general components of a computer system, but these were not specific to an expert system.
...................................................................................................................................................
3 ................................................................................................................................................
[3]
...................................................................................................................................................
(b) Describe the role of the inference engine in an expert system.
...................................................................................................................................................
The inference engine makes decisions to solve a problem or provide
...................................................................................................................................................
............................................................................................................................................. [2]
a diagnosis. It does this by using the facts in the knowledge base and
...................................................................................................................................................
............................................................................................................................................. [2]
Examiner comment
Many candidates found it difficult to provide the required level of technical detail for this question. Many did not refer to
how the inference engine interacts with the other components in the expert system to perform its role.
19
Example Responses – Paper 1
Question 10
11
10 A user has both system software and application software installed on their computer.
(a) Describe the difference between system software and application software.
............................................................................................................................................. [4]
(b) State which component in the computer would store both types of software when the power is
turned off.
secondary storage
............................................................................................................................................. [1]
Examiner comment
Some candidates incorrectly thought that both system software and application software will be stored in ROM.
20
Cambridge Assessment International Education
The Triangle Building, Shaftesbury Road, Cambridge, CB2 8EA, United Kingdom
t: +44 1223 553554
e: [email protected] www.cambridgeinternational.org