Predicted IGCSE Computer Science Paper 2025
Predicted IGCSE Computer Science Paper 2025
5. Which logic gate produces an output of 1 when both inputs are different?
A) AND
B) OR
C) XOR
D) NOT
(1 mark)
9. Which of the following best describes the role of the ALU in a computer system?
A) It manages input and output operations.
B) It executes arithmetic and logical operations.
C) It stores data temporarily.
D) It coordinates the fetching and decoding of instructions.
19. Which of the following is NOT a function of the Control Unit (CU)?
A) Fetches instructions from memory.
B) Decodes instructions.
C) Executes arithmetic and logical operations.
D) Coordinates the activities of the CPU.
22. Which of the following is the primary function of an Operating System (OS)?
A) To perform arithmetic operations.
B) To execute user programs only.
C) To manage hardware resources and provide an interface for user interaction.
D) To secure the system from malware.
24. Which of the following is a valid use of the AND logic gate?
A) The output is true if both inputs are true.
B) The output is true if one input is true.
C) The output is false if both inputs are false.
D) The output is false if one input is true.
26. Which of the following describes the role of DNS in computer networking?
A) It translates domain names into IP addresses.
B) It controls access to files over a network.
C) It encrypts data during transmission.
D) It compresses data for faster transfer.
29. What is the difference between serial and parallel data transmission?
A) Serial sends multiple bits at once, while parallel sends one bit at a time.
B) Parallel is faster than serial.
C) Serial uses more wires than parallel.
D) Parallel sends data in a sequential order.
30. Which of the following is a type of malware that spreads by copying itself to other
programs or files?
A) Trojan
B) Worm
C) Spyware
D) Adware
A) Buffering
B) Parity check
C) Compression
D) Handshaking
C) Data is transmitted one character at a time with start and stop bits.
6. Which of the following transmission methods is typically used for long-distance communication?
A) Parallel transmission
B) Serial transmission
C) Full-duplex transmission
D) Half-duplex transmission
10. What is the difference between synchronous and asynchronous data transmission?
A) Synchronous transmission uses start and stop bits, while asynchronous does not.
B) Synchronous transmission has a constant clock signal, while asynchronous transmission does not.
11. Which of the following describes the checksum technique used in error detection?
A) A method that checks for errors after transmission by adding extra bits.
B) A method that checks for errors before transmission using parity bits.
C) It breaks the data into packets and ensures they are correctly received.
13. What is the key difference between half-duplex and full-duplex data transmission?
A) Half-duplex allows data to flow in both directions, but only one direction at a time.
D) Full-duplex uses a single channel for both sending and receiving data.
A) FTP
B) SMTP
C) HTTP
D) POP3
C) To allow users to access, view, and interact with websites on the World Wide Web.
17. Which of the following is a disadvantage of using the internet for communication?
B) It provides a wide range of communication tools, such as email, video calls, and social media.
B) It resolves domain names into IP addresses so users can access websites by typing domain names
instead of IP addresses.
B) To prevent unauthorized access to or from a private network while allowing legitimate traffic.
21. What is an example of artificial intelligence (AI) being used in the real world?
22. Which of the following best describes the concept of machine learning in AI?
B) AI systems that learn from data to improve their performance over time without explicit
programming.
B) A smartphone app that allows users to see virtual furniture in their room using the camera.
B) It creates three-dimensional objects from digital models by adding material layer by layer.
C) Blockchain
26. Which of the following is a potential risk of using automated technologies in industries?
27. Which of the following is an example of emerging technology used to detect and prevent fraud
in banking?
D) Blockchain technology
12. What is the difference between RAM and ROM? Provide one example of each type of
memory.
13. Describe the function of a compiler and how it differs from an interpreter in programming.
14. What is meant by the term cloud storage? Name one advantage and one disadvantage of
using cloud storage.
15. Write an Algorithm function that takes a list of numbers and returns the largest even
number. If no even number is found, return None.
16. What is the difference between serial and parallel transmission in terms of data
communication?
17. Describe the concept of encryption. What are the two types of encryptions?
21. (a) Explain the role of the Control Unit (CU) and the Arithmetic Logic Unit (ALU) in the central
processing unit (CPU).
(b) Describe how the clock speed affects the performance of the CPU.
23. (a) Write an algorithm in pseudocode to perform a linear search on an unsorted list of
integers.
(b) What are the advantages and disadvantages of using a linear search compared to a binary
search?
24. (a) You are asked to design a database for a small online bookstore. Identify at least three
entities that would be part of this database and explain the relationships between them.
(b) Write an SQL query to retrieve the titles of all books published by a specific author.
25. (a) What are logic gates, and how are they used in computer systems?
(b) Draw the truth table for the following circuit:
o A AND (B OR NOT C)
26. (a) What are the differences between file compression and file encryption?
(b) Provide an example of when you might use file compression and when you might use file
encryption.
27. What is the difference between serial and parallel transmission? Which one is typically
used for long-distance communication and why?
28. What is the difference between compiler and interpreter? Provide one advantage and one
disadvantage of each.
29. Explain the term lossy compression and provide an example of a file type that uses it.
13. Write an Algorithm snippet that takes a number as input and prints whether it is even or
odd.
(3 marks)
1. Flowchart Design
Create a flowchart to perform the following task:
Task: Given an integer n, check if n is a positive number, zero, or negative number. The program
should output:
• "Zero" if n is equal to 0.
2. Pseudocode
Write pseudocode to find the smallest of three numbers entered by the user. The pseudocode
should use the following steps:
Example:
For n = 5, the output should be 120 (i.e., 5! = 5 × 4 × 3 × 2 × 1).
• Sort the numbers using the bubble sort method (repeatedly swapping adjacent elements if
they are in the wrong order).
• Prompt the user to choose the conversion type (Celsius to Fahrenheit or Fahrenheit to
Celsius).
• The program should prompt the user for the number of elements and the elements
themselves.
• The program should iterate through the array and keep track of the largest value found so
far.