6 Theory Past Paper (Nov, 2022) PDF
6 Theory Past Paper (Nov, 2022) PDF
6 Theory Past Paper (Nov, 2022) PDF
* 4 4 6 4 1 7 9 1 6 4 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 70.
● The number of marks for each question or part question is shown in brackets [ ].
DC (KN) 303205/2
© UCLES 2022 [Turn over
2
1 Computers often have utility software supplied with the operating system.
keep viruses it
helps to
perform maintenance
..........................................................................................................................................................
away,
or perform a
specific task, there be
..........................................................................................................................................................
can
utilities stared
many operating system,
..........................................................................................................................................................
in an
better overall
it gives user
experience.
..........................................................................................................................................................
a
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
2 Sandeep works for a company which uses software to help protect its computer systems against
malware. The company is looking for additional ways to minimise the effects of malware. Sandeep
and the other workers have already been advised on good practice when logging on and how to
use emails safely.
Describe other methods the company can instruct workers to use so that malware can be
prevented from entering its computer systems.
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
3 Most companies use transaction files to update master files in their payroll systems. One part of
the updating process is to calculate weekly or monthly pay. Another part is to update workers’
personal and work details.
Without referring to the calculation of pay, describe the three types of transaction that would
take place when workers’ details are being updated. You must give an example for each type of
transaction.
Delete a record
Transaction type 1: ...........................................................................................................................
..........................................................................................................................................................
to remove
duplicates
Example 1: .......................................................................................................................................
..........................................................................................................................................................
Change record
Transaction type 2: ...........................................................................................................................
a
..........................................................................................................................................................
to
change name
Example 2: .......................................................................................................................................
..........................................................................................................................................................
Add record
Transaction type 3: ...........................................................................................................................
a
..........................................................................................................................................................
to add new worker.
Example 3: .......................................................................................................................................
a
..........................................................................................................................................................
[6]
4 A customer at a supermarket checkout pays for their goods by inserting a card into a chip reader
and entering their personal identification number (PIN). Electronic funds transfer takes place.
..........................................................................................................................................................
verified" then
the
chip, if pin is
computer
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
a
~
.................................................................................................................................................... [5]
6 The digital divide affects many people. There can be a divide between older and younger people.
places with
computers can show
support by
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [5]
© UCLES 2022 9626/11/O/N/22 [Turn over
6
The benefits of
using spreadsheet
..........................................................................................................................................................
a
model is itcan
perform complex calculation
..........................................................................................................................................................
and it also recalculate formulas
..........................................................................................................................................................
can
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
8 Maria has been asked to write a word-processed report for her homework. She needs to choose
between using proprietary software and open source software.
..........................................................................................................................................................
of
proprietary, the source of proprietary software
..........................................................................................................................................................
is
alway keptsecret,
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
9 Jose has a greenhouse to grow his plants. He lives in a country which has a warm climate so the
greenhouse does not need a heater but has microprocessor controlled windows and a temperature
sensor.
(a) Describe how the sensor represents the temperature so the computer can read the data.
............................................................................................................................................. [1]
(b) Complete this pseudocode algorithm to show the processing which takes place to control the
temperature of the greenhouse.
-
WHILE system switched
INPUT temperature
on
3
IF temperature
THEN
> preset
- THEN
IF window closed
send signals to
open
window
...................................................................................................................................................
#DIE
...................................................................................................................................................
EISE
...................................................................................................................................................
⑰window n
...................................................................................................................................................
THEN
...................................................................................................................................................
signals window
send to
loss
...................................................................................................................................................
Ne
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [8]
(c) Discuss the advantages and disadvantages, to Jose, of using microprocessor control in this
scenario.
The benefits of is Jose can
using microprocessor
...................................................................................................................................................
reduce the chance of plants dying, since computers
...................................................................................................................................................
set
up, they have errors, andthe maintenance
...................................................................................................................................................
can
...................................................................................................................................................
...................................................................................................................................................
function when there is
bit ...................................................................................................................................................
out
cannot a
power
-can be destroyed by natural disaster
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [8]
10 Companies who store the personal data of individuals use a number of methods to prevent illegal
access to this data.
Apart from preventing illegal access, suggest other methods companies can use to protect the
confidentiality of this data.
should the
Companies follow protection rules.
..........................................................................................................................................................
allow authorized
only worker to have access to
..........................................................................................................................................................
agreement for
keeping these data secured, remove
..........................................................................................................................................................
gestags from
photos if
possible.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [5]
11 Explain what is meant by an indirect data source. In your explanation include descriptions of two
different indirect data sources.
buying beer.
..........................................................................................................................................................
a
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.