IGCSE Computer Science: What the Exam Papers Really Reward in 2023+
An examiner-focused analysis of how marks are awarded — and why structure matters more than finished code
A comprehensive breakdown of every Paper 1 question from 2017 to 2023, organised by topic. Use this to identify patterns, focus your revision, and find specific past paper questions to practise.
Click any segment to jump to that topic section
Quick Navigation
Other Sections
Most Frequent Topics
Based on analysis of all papers from 2017–2023, these are the most frequently tested concepts:
Data Representation
- Converting denary to binary and hexadecimal
- Two's complement for signed integers
- Binary addition and overflow errors
- Bits, bytes, kibibytes, mebibytes
- Binary/hexadecimal shifts
Security
- Malware types and removal
- Phishing and pharming
- SSL/HTTPS and encryption
- Firewall operation
- Data interception methods
Networks
- Error detection (parity, checksums, ARQ)
- Router and network device roles
- Network topologies
- Data transmission types
Hardware and Software
- Input/output device identification
- CPU components and registers
- Storage types (SSD vs HDD)
- Primary vs secondary storage
Data Representation
| Year | Session | Paper | Question | Topic |
|---|---|---|---|---|
| 2023 | W | 13 | 1c(i) | Bits in a byte |
| 2023 | W | 13 | 1c(ii) | Kibibytes in a mebibyte |
| 2023 | W | 13 | 2a | Binary number system explanation |
| 2023 | W | 13 | 2b | Converting denary numbers to binary |
| 2023 | W | 13 | 2c | Converting denary numbers to hexadecimal |
| 2023 | W | 13 | 2d | Two's complement for positive denary to binary |
| 2023 | W | 13 | 2e | Binary addition |
| 2023 | W | 12 | 2a-2e | Binary, hexadecimal representations, shifts, two's complement |
| 2023 | S | 11 | 1 | Binary number system, conversions, two's complement, overflow error |
| 2023 | M | 12 | 3 | Data storage conversions, examples of data stored in RAM |
| 2022 | W | 13 | 2a | Conversion of denary values to 8-bit binary |
| 2022 | W | 13 | 2b | Conversion of binary values to hexadecimal |
| 2022 | W | 12 | 1f | Binary and hexadecimal conversions for data storage |
| 2022 | S | 11 | 4 | Binary data processing, binary and hexadecimal conversions |
| 2021 | M | 12 | 1a | Converting denary values to 8-bit binary |
| 2021 | M | 12 | 1b | Maximum denary value in an 8-bit binary register |
| 2021 | M | 12 | 1c | Minimum bits to store a specific denary value |
| 2021 | W | 12 | 1a-c | Denary, hexadecimal conversions to binary, usage in web development |
| 2021 | S | 11 | 1(a) | Conversion of denary values to 8-bit binary |
| 2021 | W | 13 | 1a-1c | Binary and hexadecimal conversions, data storage calculations |
| 2019 | W | 13 | 1(d) | Storing hexadecimal colour codes in binary for web design |
| 2019 | W | 12 | 1-4 | Memory size, Von Neumann components, analogue to digital, binary arithmetic |
| 2019 | W | 11 | 2(a)-(c) | Binary to denary, using hexadecimal, hexadecimal equivalents |
| 2018 | S | 13 | 5 | Converting numbers between binary, denary, hexadecimal |
| 2018 | S | 12 | 1 | Understanding data units and conversions |
| 2018 | S | 12 | 3 | Binary representations for time |
| 2018 | S | 12 | 4 | Converting hexadecimal error codes to binary |
| 2018 | W | 12 | 1 | ASCII, binary and hexadecimal conversions |
| 2018 | W | 11 | 2 | Binary, hexadecimal conversions, using hexadecimal |
| 2018 | S | 11 | 1 | Data types and number systems terms |
| 2018 | S | 11 | 2 | Converting hexadecimal to denary |
Data Compression
| Year | Session | Paper | Question | Topic |
|---|---|---|---|---|
| 2023 | W | 13 | 7d | Compression method reducing colour depth and resolution |
| 2023 | W | 13 | 7e | Benefits of image compression |
| 2022 | W | 13 | 6 | Benefits of lossy compression, LED display operation |
| 2021 | S | 11 | 7(a)-(d) | Lossless compression for sound, benefits and drawbacks |
| 2019 | W | 12 | 5-6 | Compression advantages/disadvantages, MIDI files |
| 2019 | M | 12 | 6(c) | Lossless compression advantages for programs |
| 2018 | W | 11 | 1 | Identifying compression types |
| 2018 | S | 11 | 4 | Compression types for different files |
Hardware and Software
| Year | Session | Paper | Question | Topic |
|---|---|---|---|---|
| 2023 | W | 13 | 1a | Input devices of a mobile phone |
| 2023 | W | 13 | 1b | Output devices of a mobile phone |
| 2023 | S | 13 | 2a-2g | CPU, registers, buses, I/O devices, primary storage, microprocessor functions |
| 2023 | S | 12 | 1 | Output devices selection |
| 2022 | W | 12 | 1 | Input/output devices for a ticket machine |
| 2022 | W | 12 | 1c, 1d | Resistive touchscreen operation, pros/cons, alternatives |
| 2022 | W | 11 | 1a, 1b | Input device for info point, output device |
| 2022 | W | 11 | 1c | Example of primary storage |
| 2021 | M | 12 | 3 | Completing device names and descriptions |
| 2021 | W | 12 | 2a-b | Output devices, suitable input devices |
| 2021 | S | 11 | 2(a) | Devices for inputting personal data |
| 2021 | S | 11 | 2(b) | Statements about HDDs, SSDs, USB drives |
| 2019 | W | 11 | 1(a)-(c) | 3D cutters, printer types and suitability |
| 2019 | W | 11 | 4(a)-(d) | I/O devices, secondary storage, QR codes |
| 2019 | M | 12 | 2(a)-(b) | Input/output device definitions and examples |
| 2019 | M | 12 | 8 | USB, printer types, toner printer pros/cons |
| 2018 | W | 12 | 5 | Identifying output devices |
| 2018 | W | 11 | 5 | Classifying storage, optical writing, storage choice |
| 2018 | W | 11 | 6 | 3D printers/cutters, software, DLP technology |
| 2018 | S | 11 | 9 | Secondary, offline storage, biometrics |
Computer Architecture
| Year | Session | Paper | Question | Topic |
|---|---|---|---|---|
| 2023 | W | 13 | 3a | CPU components |
| 2023 | W | 13 | 3b | CPU cache purpose |
| 2023 | W | 13 | 3c | Component for CPU cycles/second |
| 2023 | W | 13 | 3d | Component for calculations & logic operations |
| 2021 | M | 12 | 8a | Stored program concept |
| 2021 | M | 12 | 8b(i) | Program Counter role |
| 2021 | M | 12 | 8b(ii) | Control Bus role |
| 2021 | M | 12 | 8c | Interrupts in Von Neumann model |
| 2018 | W | 13 | 11 | Program Counter & Memory Data Register roles |
| 2018 | M | 12 | 10 | Stored program, MAR & MDR functions |
Networks
| Year | Session | Paper | Question | Topic |
|---|---|---|---|---|
| 2023 | W | 13 | 5a | Data transmission error causes |
| 2023 | W | 13 | 5b | Error detection without calculated value |
| 2023 | W | 13 | 5c | ARQ with positive acknowledgement operation |
| 2023 | W | 13 | 8 | Router role |
| 2021 | W | 13 | 2 | Network topologies, advantages, use cases |
| 2019 | W | 13 | 3 | Completing data transmission statements |
| 2018 | W | 13 | 4 | MAC address binary representation & storage |
| 2018 | W | 13 | 5 | Serial and half-duplex transmission |
| 2018 | S | 13 | 2 | Data transmission terms & applications |
| 2018 | S | 13 | 4b | Parallel & serial transmission descriptions |
| 2018 | S | 12 | 5 | Using parity bits for error detection |
| 2017 | W | 12 | 4 | Suitable transmission & error checking methods |
Communication and Internet Technologies
| Year | Session | Paper | Question | Topic |
|---|---|---|---|---|
| 2023 | W | 13 | 4a | Main web browser purpose |
| 2023 | W | 13 | 4b | Web browser autofill function |
| 2023 | W | 13 | 4c | Web browser quick access function |
| 2023 | W | 13 | 4d | How SSL secures data |
| 2021 | M | 12 | 1d(i) | Serial vs parallel transmission |
| 2021 | M | 12 | 1d(ii) | Half-duplex data transmission |
| 2021 | M | 12 | 1d(iii) | Checksums for error detection |
| 2022 | W | 12 | 6 | SSL protocol, proxy servers |
| 2022 | W | 11 | 8 | HTML, secure connections, cookies |
| 2019 | W | 11 | 3(a)-(d) | Firewalls, security methods |
| 2019 | W | 12 | 7-8 | Browser functions, HTTPS significance |
| 2017 | W | 12 | 5 | Cookies explanation, error checking methods |
| 2017 | W | 11 | 3 | URL components, IP address meaning |
Programming
| Year | Session | Paper | Question | Topic |
|---|---|---|---|---|
| 2023 | S | 13 | 4 | High-level languages, translators, executables |
| 2022 | S | 12 | 5 | High-level traits, compilers, IDEs |
| 2021 | W | 13 | 4 | Variables, constants, data types |
| 2021 | M | 12 | 7a | High-level languages |
| 2021 | M | 12 | 7b | Interpreters vs compilers |
| 2019 | W | 13 | 2(a) | High-level language characteristics & examples |
| 2019 | M | 12 | 5-6 | High-level benefits, compilers vs interpreters |
| 2018 | W | 13 | 7 | Interpreters, compiling, lossless compression |
| 2018 | S | 13 | 9 | Assemblers, compilers, interpreters |
Logic Gates
| Year | Session | Paper | Question | Topic |
|---|---|---|---|---|
| 2022 | W | 13 | 5 | Logic circuit, truth table completion |
| 2022 | W | 12 | 7 | Logic gates, truth table completion |
| 2021 | M | 12 | 5a | Identifying logic gates from truth tables |
| 2021 | M | 12 | 5b | Logic circuit for aeroplane warning system |
| 2019 | M | 12 | 7 | Circuit design, truth tables |
| 2018 | W | 13 | 10 | Truth tables, logic circuit design |
| 2018 | S | 13 | 8 | Truth tables, logic circuit drawing |
| 2018 | S | 12 | 7 | Logic circuit analysis |
| 2018 | S | 11 | 6 | Logic circuit, truth table |
| 2018 | M | 12 | 7 | Truth tables, logic circuits |
| 2017 | W | 13 | 5 | Logic design, XOR gate |
| 2017 | W | 12 | 7 | Logic circuit drawing |
| 2017 | W | 11 | 5 | Logic circuit for statement |
Security
| Year | Session | Paper | Question | Topic |
|---|---|---|---|---|
| 2023 | W | 12 | 1a | Non-malware cyber threat identification |
| 2023 | W | 12 | 1b | Malware examples |
| 2023 | W | 12 | 1c | Malware removal software |
| 2023 | W | 12 | 8 | Data interception and solution |
| 2022 | W | 11 | 4a | Electronic bank detail theft methods |
| 2022 | W | 11 | 4b | Data safety encryption, symmetric encryption |
| 2021 | M | 12 | 2c(i) | Benefit of SSL connection |
| 2021 | M | 12 | 2c(ii) | Creating SSL connection |
| 2021 | M | 12 | 6a | How firewalls prevent hacking |
| 2021 | M | 12 | 6b | Internet risks for obtaining personal data |
| 2021 | W | 13 | 7 | Cybersecurity measures, encryption techniques |
| 2021 | S | 11 | 3 | Firewall operation & security methods |
| 2021 | S | 11 | 4 | Phishing and pharming definitions |
| 2019 | W | 13 | 1(b) | Enhancing encryption for library archives |
| 2019 | W | 13 | 1(c) | Parity & ARQ for error management |
| 2018 | W | 12 | 4 | Security risks, firewall functions |
| 2018 | W | 11 | 4 | Phishing, pharming, security suggestions |
| 2018 | S | 13 | 3 | Phishing, pharming, spam definitions |
| 2018 | S | 13 | 4c | Encryption enhancing security |
| 2018 | S | 12 | 12 | Securing transmitted personal data |
| 2017 | W | 13 | 8 | Accidental data damage, SSL applications |
| 2017 | W | 13 | 9 | Online banking security beyond SSL |
| 2017 | W | 11 | 8 | Accidental data damage, SSL applications |
| 2017 | W | 11 | 9 | Additional online banking security |
Operating Systems
| Year | Session | Paper | Question | Topic |
|---|---|---|---|---|
| 2023 | W | 13 | 1d | Operating system purpose |
| 2023 | S | 13 | 10 | Virtual memory usage |
| 2023 | S | 13 | 11 | File, memory, multitasking software |
| 2022 | W | 12 | 1e | Operating system functions |
| 2018 | S | 13 | 6 | OS role in handling interrupts |
| 2018 | M | 12 | 13 | Operating system functions |
Database Systems
Note: Query tables (QBE) are no longer assessed since 2021. Only SQL is now tested.
| Year | Session | Paper | Question | Topic |
|---|---|---|---|---|
| 2021 | W | 13 | 8 | Database concepts, SQL queries |
How to Use This Resource
- Identify weak topics – Use the frequency data above to prioritise high-frequency topics
- Find specific questions – Use the tables to locate past paper questions on topics you want to practise
- Track patterns – Note which question types appear regularly (e.g., binary conversions, firewall functions)
- Practise systematically – Work through questions topic-by-topic rather than paper-by-paper
External Resources
- r/IGCSE community discussions ↗
- Isaac Computer Science – problem-solving practice ↗
- Official CAIE 0478 syllabus page ↗
Understanding Paper 2: Why Correct Code Still Loses Marks
For many students, Paper 2 feels unpredictable.
You can understand programming concepts, write working code in class, and still lose a surprising number of marks in the exam. That isn't because your logic is wrong — it's because Paper 2 does not reward programming skill in the way most students expect.
After analysing CAIE IGCSE Computer Science Paper 2 mark schemes from 2017 to 2023, a clear pattern emerges.
Paper 2 rewards approach, structure, and visibility of intent far more than syntactic accuracy or "clever" solutions.
How Paper 2 Marks Are Actually Awarded
Across multiple years and variants, the same marking behaviour appears again and again:
- Marks are awarded per requirement, not per overall solution
- Each bullet point or instruction in the question maps directly to marks
- Method marks are common, even when later logic is incomplete
- Variable names, language choice, and formatting are flexible
- Syntax errors are often ignored if intent is clear
In short: examiners are checking boxes, not running your code.
If a requirement is not clearly met somewhere on the page, it usually earns zero — even if your overall solution would "work".
Why Students Lose Marks on Paper 2
The most common error is trying to solve the entire problem in one pass.
Students read the scenario, start writing pseudocode immediately, and aim for a complete solution as quickly as possible. This feels logical — but it hides evidence from the examiner.
When everything is written as one block:
- It's hard to see which requirement is being met
- Missing one step can collapse multiple marks
- Partial understanding is not visible
- Running out of time costs everything at once
This is why two students with similar understanding can receive very different marks.
An Examiner-Friendly Approach to Paper 2 Scenarios
High-scoring scripts almost always follow the same pattern:
- Extract the requirements first
The question already lists what the program must do. These are usually written in the order the mark scheme expects. - Turn each requirement into a short comment
Each comment acts as a signpost for the examiner. - Write the solution directly under each comment
One requirement at a time. One mark opportunity at a time.
This approach does three things:
- Makes your intent obvious
- Prevents drifting away from the question
- Protects marks if you run out of time
Even unfinished answers can score well if the structure is clear.
Why "correct code" still loses marks
Paper 2 is not testing whether you can program a working system.
It is testing whether you can:
- Interpret a scenario
- Translate requirements into algorithmic steps
- Show those steps clearly and explicitly
A fully working solution that skips a stated requirement will lose marks. A partially completed solution that clearly addresses each requirement can still score strongly.
This is why self-marking is unreliable — students judge correctness, while examiners judge evidence.
A better way to practise Paper 2
The most effective preparation in the final weeks is not doing more questions, but practising deliberately:
- Redo past Paper 2 scenario questions
- Compare your answer directly to the mark scheme
- Check whether each requirement is clearly visible
- Ask yourself: "Would an examiner be able to award marks quickly here?"
If you want structured practice with examiner-style feedback, tools that assess answers requirement-by-requirement can help highlight where marks are actually being lost. Used properly, they can reinforce the mindset Paper 2 demands rather than encouraging guesswork.
Final takeaway
Paper 2 is predictable once you stop treating it like a programming test.
It rewards:
- Requirement-driven thinking
- Clear structure
- Visible intent
If you change how you approach the question, the marks usually follow.
This mindset shift alone is often worth more than learning new syntax in the final weeks before the exam.
Further discussion
This analysis is based on recurring questions and exam-preparation discussions from students studying IGCSE Computer Science (0478), particularly around Paper 1 topic distribution and Paper 2 scenario questions.
Key ideas from this article have been explored and refined through public student discussions, including those on:
- r/IGCSE — exam strategy and revision discussions
These discussions help highlight common misconceptions and patterns in how marks are awarded across exam series.