Past Paper Ict
Past Paper Ict
* 7 0 0 2 1 3 2 4 4 6 *
1 hour 30 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CJ) 205798/2
© UCLES 2021 [Turn over
2
(i) Complete the following table to describe the two terms about graphics.
Term Description
...........................................................................................................................
Pixel ...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
File header ...........................................................................................................................
...........................................................................................................................
[2]
(ii) The image is scanned with an image resolution of 1024 × 512 pixels, and a colour depth
of 8 bits per pixel.
Calculate an estimate for the file size, giving your answer in mebibytes. Show your
working.
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Identify one method of lossless compression that can be used to compress the image and
describe how the method will reduce the file size.
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2021 9618/13/M/J/21
3
(c) One of the colours used in the image has the hexadecimal colour code:
#FC238A
FC is the amount of red, 23 is the amount of green and 8A is the amount of blue in the colour.
..................................................................................................................................... [1]
(ii) The amount of green in binary is 00100011. This has the denary number 15 added to it
to create a second colour.
Add the denary number 15 to the binary number 00100011 and give your answer in
binary.
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Subtract the denary number 10 from the two’s complement representation 00100011.
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(d) Anya made sure that the image was not subject to any copyright before scanning it.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(a) Draw one line from each utility software to its correct description.
[4]
(b) Identify four key management tasks that the Operating System will perform.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
4 ................................................................................................................................................
[4]
3 A processor has one general purpose register, the Accumulator (ACC), and several special
purpose registers.
(a) Complete the following description of the role of the registers in the fetch-execute cycle by
writing the missing registers.
(b) The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
LDD <address> Direct addressing. Load the contents of the location at the given address to ACC
Indirect addressing: The address to be used is at the given address. Load the
LDI <address>
contents of this second address to ACC
Indexed addressing. Form the address from <address> + the contents of the
LDX <address>
Index Register. Copy the contents of this calculated address to ACC
LDR #n Immediate addressing. Load the number n to IX
MOV <register> Move the contents of the accumulator to the given register (IX)
STO <address> Store contents of ACC at the given address
ADD <address> Add the contents of the given address to the ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP <address> Compare the contents of ACC with the contents of <address>
JPE <address> Following a compare instruction, jump to <address> if the compare was True
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
OUT Output to the screen the character whose ASCII value is stored in ACC
END Return control to the operating system
Bits in ACC are shifted logically n places to the left. Zeros are introduced on
LSL #n
the right hand end
Bits in ACC are shifted logically n places to the right. Zeros are introduced on
LSR #n
the left hand end
<address> can be an absolute address or a symbolic address
# denotes a denary number, e.g. #123
The current contents of the main memory and selected values from the ASCII character set
are shown.
365 1
366 3
367 65
368 66
IX 0
Complete the trace table for the program currently in main memory.
1 3 65 66 0
[6]
0 0 1 1 0 1 0 1
Write the contents of the Accumulator after the processor has executed the following
instruction:
LSL #2
[1]
0 0 1 1 0 1 0 1
Identify the mathematical operation that the following instruction will perform on the
contents of the accumulator.
LSR #3
...........................................................................................................................................
..................................................................................................................................... [1]
4 Melinda and her friends set up a peer-to-peer network between their computers to share data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Describe two drawbacks to Melinda and her friends of using a peer-to-peer network.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(c) Melinda connects her laptop to the internet through her router.
(i) Tick (3) one box in each row to identify whether the task is performed by the router or
not.
(ii) Melinda mainly uses the internet to watch films and play computer games.
Tick (3) one box to identify whether Melinda should connect to the router using a wired
or wireless network and justify your choice.
Wired
Wireless
Justification .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(d) Melinda sends emails from her webmail account (email account accessed through a website).
Explain whether Melinda is using the internet, or the World Wide Web (WWW), or both.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Describe what is meant by an embedded system, using the washing machine as an example.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) The washing machine’s embedded system makes use of both Random Access Memory
(RAM) and Read Only Memory (ROM).
State the purpose of RAM and ROM within the washing machine’s embedded system.
RAM ..........................................................................................................................................
...................................................................................................................................................
ROM .........................................................................................................................................
...................................................................................................................................................
[2]
(c) The temperature in her refrigerator must be kept between 4 and 6 degrees Celsius.
The microprocessor in the refrigerator turns on the cooling if the temperature is too high, and
turns off the cooling if the temperature is too low.
Explain why the system in the refrigerator is a control and not a monitoring system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
State the type of validation check that each of the algorithms performs.
(a)
INPUT x
OUTPUT "Invalid"
ENDIF
.................................................................................................................................................... [1]
(b)
INPUT x
IF x = "" THEN
OUTPUT "Invalid"
ENDIF
.................................................................................................................................................... [1]
(c)
INPUT x
OUTPUT "Invalid"
ENDIF
.................................................................................................................................................... [1]
(a) Bobby tells Kim that a file-based approach is usually better than a relational database.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Bobby has a shop that sells products to customers. His database will store data about his
customers, their payment details, orders and the products he sells. Customers will have login
details to access their accounts. The database will update customers’ payment and login
details without keeping any historical records.
(i) Give one example of each of the following relationships from Bobby’s database.
one-to-one
...........................................................................................................................................
...........................................................................................................................................
one-to-many
...........................................................................................................................................
...........................................................................................................................................
many-to-many
...........................................................................................................................................
...........................................................................................................................................
[3]
(ii) Tick (3) one box to identify the relationship that cannot be directly implemented in a
normalised relational database.
one-to-one
one-to-many
many-to-many
[1]
© UCLES 2021 9618/13/M/J/21 [Turn over
16
Write a Data Definition Language (DDL) statement to define a new database with the
name SHOPORDERS.
...........................................................................................................................................
..................................................................................................................................... [1]
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
8 Tick (3) one box in each row to identify the logic gate that each statement describes.
[3]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
1 hour 30 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (LK) 205797/1
© UCLES 2021 [Turn over
2
1 Raj owns houses that other people rent from him. He has a database that stores details about
the people who rent houses, and the houses they rent. The database, HOUSE_RENTALS, has the
following structure:
(a) Give the definition of the following database terms, using an example from the database
HOUSE_RENTALS for each definition.
..............................................................................................................................
Field
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
Entity
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
Foreign key
..............................................................................................................................
..............................................................................................................................
[6]
(b) Tick (3) one box to identify whether the database HOUSE_RENTALS is in Third Normal Form
(3NF) or not in 3NF.
Justify your choice using one or more examples from the database HOUSE_RENTALS.
In 3NF
Not in 3NF
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(i) Complete the following Data Definition Language (DDL) statement to define the table
RENTAL.
.......................................................... (RentalID)
);
[4]
(ii) Write a Data Manipulation Language (DML) script to return the first name and last name
of all customers who have not paid their deposit.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(a) Explain the reasons why it is important that Aisha acts ethically in relation to her team
members.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) The team are developing a computer game where the user plays a board game (such as
chess) against the computer.
Describe how the computer would use Artificial Intelligence (AI) to play the board game.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Tick (3) one or more boxes in each row to identify the licence(s) each statement describes.
Free Open
Commercial
Statement Software Source Shareware
Software
Foundation Initiative
[4]
B S
[4]
A B C Working space S
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[2]
4 The table shows part of the instruction set for a processor. The processor has one general purpose
register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
Direct addressing. Load the contents of the location at the given address to
LDD <address>
ACC
STO <address> Store contents of ACC at the given address
ADD <address> Add the contents of the given address to the ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
DEC <register> Subtract 1 from the contents of the register (ACC or IX)
CMP <address> Compare the contents of ACC with the contents of <address>
JPE <address> Following a compare instruction, jump to <address> if the compare was True
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
IN Key in a character and store its ASCII value in ACC
OUT Output to the screen the character whose ASCII value is stored in ACC
END Return control to the operating system
# denotes a denary number, e.g. #123
The current contents of the main memory and selected values from the ASCII character set are:
100 68
101 65
102 100
(a) Complete the trace table for the program currently in main memory when the following
characters are input:
A D
Do not trace the program any further when the third input is required.
[4]
Instruction
Explanation
Opcode Operand
AND #n Bitwise AND operation of the contents of ACC with the operand
AND <address> Bitwise AND operation of the contents of ACC with the contents of <address>
XOR #n Bitwise XOR operation of the contents of ACC with the operand
XOR <address> Bitwise XOR operation of the contents of ACC with the contents of <address>
OR #n Bitwise OR operation of the contents of ACC with the operand
OR <address> Bitwise OR operation of the contents of ACC with the contents of <address>
<address> can be an absolute address or a symbolic address
# denotes a denary number, e.g. #123
Bit Number 7 6 5 4 3 2 1 0
300 0 1 1 0 0 1 1 0
(i) The contents of memory address 300 represent an unsigned binary integer.
Write the denary value of the unsigned binary integer in memory address 300.
..................................................................................................................................... [1]
(ii) An assembly language program needs to test if bit number 2 in memory address 300
is a 1.
......................... #4
[1]
(iii) An assembly language program needs to set bit numbers 4, 5, 6 and 7 to 0, but keep
bits 0 to 3 with their existing values.
...........................................................................................................................................
..................................................................................................................................... [2]
(a) Complete the following descriptions of internal components of a computer by writing the
missing terms.
or read from.
logical comparisons.
[5]
(b) Describe the ways in which the following factors can affect the performance of his laptop
computer.
Number of cores
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Clock speed
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(c) Seth accesses both software and data using cloud computing.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(d) Draw one line from each term to its most appropriate description.
Term Description
Public IP address
It increments by 1 each time the device
connects to the internet
[4]
(a) State the number of characters that can be represented by the ASCII character set and the
extended ASCII character set.
ASCII ...........................................................
(b) Explain how a word such as ‘HOUSE’ is represented by the ASCII character set.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
The Unicode value for the character ‘1’ is denary value 49.
(i) Write the hexadecimal value for the Unicode character ‘1’.
..................................................................................................................................... [1]
(ii) Write the denary value for the Unicode character ‘5’.
..................................................................................................................................... [1]
(a) Jennifer uses a program library to help her write her computer program.
Describe how a program library can be used while writing a computer program.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Jennifer uses an Integrated Development Environment (IDE) to write her computer program.
(i) The IDE allows Jennifer to use both an interpreter and a compiler while creating her
computer program.
Describe the ways in which Jennifer can use both a compiler and an interpreter while
developing the program.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) Identify two debugging tools that a typical IDE can provide.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
8 A company has several security measures in place to prevent unauthorised access to the data on
its computers.
(a) Describe the difference between the security and privacy of data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Each employee has a username and password to allow them to log onto a computer. An
employee’s access rights to the data on the computers is set to either read-only, or read and
write.
Identify one other software-based measure that could be used to restrict the access to the
data on the computers.
...................................................................................................................................................
............................................................................................................................................. [1]
(c) The company is also concerned about threats posed by networks and the internet.
Identify two threats to the data that are posed by networks and the internet.
Threat 1 ....................................................................................................................................
...................................................................................................................................................
Threat 2 ....................................................................................................................................
...................................................................................................................................................
[2]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
1 hour 30 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (PQ) 214537
© UCLES 2021 [Turn over
2
(i) Complete the following table to describe the two terms about graphics.
Term Description
...........................................................................................................................
Pixel ...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
File header ...........................................................................................................................
...........................................................................................................................
[2]
(ii) The image is scanned with an image resolution of 1024 × 512 pixels, and a colour depth
of 8 bits per pixel.
Calculate an estimate for the file size, giving your answer in mebibytes. Show your
working.
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Identify one method of lossless compression that can be used to compress the image and
describe how the method will reduce the file size.
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2021 9618/11/M/J/21
3
(c) One of the colours used in the image has the hexadecimal colour code:
#FC238A
FC is the amount of red, 23 is the amount of green and 8A is the amount of blue in the colour.
..................................................................................................................................... [1]
(ii) The amount of green in binary is 00100011. This has the denary number 15 added to it
to create a second colour.
Add the denary number 15 to the binary number 00100011 and give your answer in
binary.
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Subtract the denary number 10 from the two’s complement representation 00100011.
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(d) Anya made sure that the image was not subject to any copyright before scanning it.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(a) Draw one line from each utility software to its correct description.
[4]
(b) Identify four key management tasks that the Operating System will perform.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
4 ................................................................................................................................................
[4]
3 A processor has one general purpose register, the Accumulator (ACC), and several special
purpose registers.
(a) Complete the following description of the role of the registers in the fetch-execute cycle by
writing the missing registers.
(b) The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
LDD <address> Direct addressing. Load the contents of the location at the given address to ACC
Indirect addressing: The address to be used is at the given address. Load the
LDI <address>
contents of this second address to ACC
Indexed addressing. Form the address from <address> + the contents of the
LDX <address>
Index Register. Copy the contents of this calculated address to ACC
LDR #n Immediate addressing. Load the number n to IX
MOV <register> Move the contents of the accumulator to the given register (IX)
STO <address> Store contents of ACC at the given address
ADD <address> Add the contents of the given address to the ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP <address> Compare the contents of ACC with the contents of <address>
JPE <address> Following a compare instruction, jump to <address> if the compare was True
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
OUT Output to the screen the character whose ASCII value is stored in ACC
END Return control to the operating system
Bits in ACC are shifted logically n places to the left. Zeros are introduced on
LSL #n
the right hand end
Bits in ACC are shifted logically n places to the right. Zeros are introduced on
LSR #n
the left hand end
<address> can be an absolute address or a symbolic address
# denotes a denary number, e.g. #123
The current contents of the main memory and selected values from the ASCII character set
are shown.
365 1
366 3
367 65
368 66
IX 0
Complete the trace table for the program currently in main memory.
1 3 65 66 0
[6]
0 0 1 1 0 1 0 1
Write the contents of the Accumulator after the processor has executed the following
instruction:
LSL #2
[1]
0 0 1 1 0 1 0 1
Identify the mathematical operation that the following instruction will perform on the
contents of the accumulator.
LSR #3
...........................................................................................................................................
..................................................................................................................................... [1]
4 Melinda and her friends set up a peer-to-peer network between their computers to share data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Describe two drawbacks to Melinda and her friends of using a peer-to-peer network.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(c) Melinda connects her laptop to the internet through her router.
(i) Tick (3) one box in each row to identify whether the task is performed by the router or
not.
(ii) Melinda mainly uses the internet to watch films and play computer games.
Tick (3) one box to identify whether Melinda should connect to the router using a wired
or wireless network and justify your choice.
Wired
Wireless
Justification .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(d) Melinda sends emails from her webmail account (email account accessed through a website).
Explain whether Melinda is using the internet, or the World Wide Web (WWW), or both.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Describe what is meant by an embedded system, using the washing machine as an example.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) The washing machine’s embedded system makes use of both Random Access Memory
(RAM) and Read Only Memory (ROM).
State the purpose of RAM and ROM within the washing machine’s embedded system.
RAM ..........................................................................................................................................
...................................................................................................................................................
ROM .........................................................................................................................................
...................................................................................................................................................
[2]
(c) The temperature in her refrigerator must be kept between 4 and 6 degrees Celsius.
The microprocessor in the refrigerator turns on the cooling if the temperature is too high, and
turns off the cooling if the temperature is too low.
Explain why the system in the refrigerator is a control and not a monitoring system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
State the type of validation check that each of the algorithms performs.
(a)
INPUT x
OUTPUT "Invalid"
ENDIF
.................................................................................................................................................... [1]
(b)
INPUT x
IF x = "" THEN
OUTPUT "Invalid"
ENDIF
.................................................................................................................................................... [1]
(c)
INPUT x
OUTPUT "Invalid"
ENDIF
.................................................................................................................................................... [1]
(a) Bobby tells Kim that a file-based approach is usually better than a relational database.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Bobby has a shop that sells products to customers. His database will store data about his
customers, their payment details, orders and the products he sells. Customers will have login
details to access their accounts. The database will update customers’ payment and login
details without keeping any historical records.
(i) Give one example of each of the following relationships from Bobby’s database.
one-to-one
...........................................................................................................................................
...........................................................................................................................................
one-to-many
...........................................................................................................................................
...........................................................................................................................................
many-to-many
...........................................................................................................................................
...........................................................................................................................................
[3]
(ii) Tick (3) one box to identify the relationship that cannot be directly implemented in a
normalised relational database.
one-to-one
one-to-many
many-to-many
[1]
© UCLES 2021 9618/11/M/J/21 [Turn over
16
Write a Data Definition Language (DDL) statement to define a new database with the
name SHOPORDERS.
...........................................................................................................................................
..................................................................................................................................... [1]
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
8 Tick (3) one box in each row to identify the logic gate that each statement describes.
[3]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
1 hour 30 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (JC/CT) 188578/2
© UCLES 2020 [Turn over
2
1 Identify the most appropriate utility program to use for each of the following tasks.
[4]
Draw one line from each term relating to videos to its correct description.
Term Description
Interlaced encoding
Image resolution
[4]
© UCLES 2020 9608/13/O/N/20
3
3 Hannah is writing a computer program using a high-level language. She uses both a compiler and
an interpreter.
(a) Describe the ways in which Hannah will use an interpreter while writing the program.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Explain the reasons why Hannah uses a compiler when she has finished writing the program.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) Some high-level languages are partially compiled and partially interpreted.
Give one benefit and one drawback of using a language that is partially compiled and partially
interpreted.
Benefit ......................................................................................................................................
...................................................................................................................................................
Drawback ..................................................................................................................................
...................................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
Give the reasons why the laptop does not have a public IP address.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
Give three differences between the format of an IPv4 address and an IPv6 address.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(b) A Public Switched Telephone Network (PSTN) is one example of a communication system
that can be used to support the Internet.
Identify and describe two other communication systems that can be used to support the
Internet.
System 1 ...................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
System 2 ...................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
[4]
(i) Complete the following table by writing a description of the function of each line of PHP
code.
$number1 = 22;
$newValue = $_GET["number"];
[4]
...........................................................................................................................................
..................................................................................................................................... [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(a) (i) Complete the table by writing the register transfer notation for each of the descriptions.
[4]
(ii) Write one of the letters A, B, C or D (from the table above) on each row (1 to 4), to show
the correct order of the fetch-execute cycle.
1 ................................
2 ................................
3 ................................
4 ................................
[2]
(b) Buses are used to transfer data between various components of the computer system.
Tick (✓) one or more boxes on each row to identify the bus(es) each statement describes.
(c) The following table shows assembly language instructions for a processor that has one
general purpose register, the Accumulator (ACC).
Instruction
Explanation
Op code Operand
INV Input a denary value from the keyboard and store it in ACC.
LDD <address> Direct addressing. Load the contents of the location at the given address to ACC.
LDM #n Immediate addressing. Load the denary number n to ACC.
Indirect addressing. The address to be used is at the given address. Load the
LDI <address>
contents of this second address to ACC.
ADD <address> Add the contents of the given address to ACC.
OUT Output to screen the character whose ASCII value is stored in ACC.
INC <register> Add 1 to the contents of the register (ACC or IX).
CMP <address> Compare the contents of ACC with the contents of <address>.
JPE <address> Following a compare instruction, jump to <address> if the compare was True.
JPN <address> Following a compare instruction, jump to <address> if the compare was False.
STO <address> Store contents of ACC at the given address.
END Return control to the operating system.
(i) The assembly language instructions are grouped according to their function.
Write one example of an op code from the table of instructions for each of the following
groups.
Arithmetic ............................................................
Address Instruction
500 INV
501 STO 901
502 INV
503 STO 900
504 ADD 902
505 STO 902
506 LDD 903
507 INC ACC
508 STO 903
509 CMP 901
510 JPN 502
511 END
…
900
901
902 0
903 0
© UCLES 2020 9608/13/O/N/20
9
Trace the program currently in memory using the following trace table when the values
2, 10 and 3 are input.
Memory address
Instruction
ACC
address
900 901 902 903
0 0
500 2
[6]
© UCLES 2020 9608/13/O/N/20 [Turn over
10
X 1 1 0 0 1 0 1 0
..................................................................................................................................... [1]
..................................................................................................................................... [1]
(iii) State why the binary number in X cannot represent a Binary Coded Decimal (BCD).
...........................................................................................................................................
..................................................................................................................................... [1]
6 Lara is managing a team of software developers who are writing a computer program.
(a) Benedict is one of the developers. He is struggling to keep up with his workload.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Lara has identified that when a specific sequence of actions is performed in the program, a
run-time error causes the program to crash.
She has decided there is not enough time to debug the code because the client needs the
system urgently, and there is a possibility that the client may never perform this sequence of
actions.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) The client wants to copyright the final program so that no one else can copy or amend it.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Identify two software licences that would be appropriate for the program.
Licence 1 ...........................................................................................................................
Licence 2 ...........................................................................................................................
[2]
(iii) Identify one software licence that would not be appropriate for the program. Justify your
choice.
Justification .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
© UCLES 2020 9608/13/O/N/20 [Turn over
12
Wilbur Designs
(a) Describe how the logo is represented and encoded by the computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Wilbur scans a hand drawn image. The scanned image uses 8 bits to store the colour for
each pixel. The image is 2048 pixels wide by 1024 pixels high.
(i) Calculate an estimate of the file size of the scanned image. Give your answer rounded to
the nearest MB.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Answer ................................. MB
[2]
(ii) Wilbur wants to compress the scanned image before emailing it to his colleague.
Describe one lossy compression technique that Wilbur can use to compress this image.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
B X
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(b) Identify one logic gate not used in the logic circuit shown. Complete the truth table for this
logic gate with the inputs A and B.
A B Output
0 0
0 1
1 0
1 1
[2]
© UCLES 2020 9608/13/O/N/20
15
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
1 hour 30 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (KN) 188577/1
© UCLES 2020 [Turn over
2
(i) Convert the following denary number into Binary Coded Decimal (BCD).
105
..................................................................................................................................... [1]
(ii) Convert the following two’s complement binary integer into denary.
10111111
..................................................................................................................................... [1]
AB
..................................................................................................................................... [1]
The following tables show part of the ASCII code character set.
(i) Describe how the computer uses ASCII codes to represent characters.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
Bed
...........................................................................................................................................
..................................................................................................................................... [1]
(iii) Give the denary ASCII code for the following character.
..................................................................................................................................... [1]
(a) Describe, using an example, how a text file is compressed using RLE.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Explain why run-length encoding will sometimes increase the size of a text file.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
3 (a) Complete the following statements about CPU architecture by filling in the missing terms.
The Von Neumann model for a computer system uses the ....................................... program
concept.
....................................... it.
The processor uses several ....................................... to store the data and instructions from
the program because they can be accessed faster than main memory.
[6]
BLANK PAGE
(b) The following table shows assembly language instructions for a processor that has one
general purpose register, the Accumulator (ACC).
Instruction
Explanation
Op code Operand
Direct addressing. Load the contents of the location at the given address to
LDD <address>
ACC.
LDM #n Immediate addressing. Load the denary number n to ACC.
Indirect addressing. The address to be used is at the given address. Load the
LDI <address>
contents of this second address to ACC.
STO <address> Store contents of ACC at the given address.
CMP <address> Compare the contents of ACC with the contents of <address>.
OUT Output to screen the character whose ASCII value is stored in ACC.
JPE <address> Following a compare instruction, jump to <address> if the compare was True.
Following a compare instruction, jump to <address> if the compare was
JPN <address>
False.
END Return control to the operating system.
80 10
81 2
82 0
Trace the program currently in memory using the following trace table.
The first instruction has been completed for you.
10 2 0
50 10
[5]
Tick (✓) one box in each column to identify the appropriate instruction group for each of
the three assembly language instructions.
Data movement
Arithmetic operations
Compare instructions
[3]
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(b) Describe the difference between the operation of an AND gate and a NAND gate.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
© UCLES 2020 9608/12/O/N/20
9
5 A teacher uses a relational database, RESULTS, to store data about her students and their test
results.
(a) Describe the benefits to the teacher of using a relational database instead of a file-based
approach.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) The teacher sets up the RESULTS database using a Database Management System (DBMS).
(i) Explain the ways in which the developer interface of a DBMS will help the teacher set up
the database.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) The DBMS creates a data dictionary for the RESULTS database.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(i) Complete the following table by giving one example of each database term from the
database RESULTS. Give both the field name and the corresponding table name.
Primary key
Foreign key
Attribute
[3]
(ii) Tick (✓) one box to identify whether the database RESULTS is in 1NF, 2NF or 3NF.
Justify your choice.
Justification: ......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(iii) Complete the Data Manipulation Language (DML) script to display the Student ID, mark
and maximum marks for all tests with the topic of ‘Programming’.
(iv) The teacher wants to implement validation to make sure that all data entered into the
database RESULTS are reasonable.
Name three different methods of data validation that can be used in the RESULTS
database. Describe how each method will limit the data that can be entered in this
database.
Method 1 ...........................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
Method 2 ...........................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
Method 3 ...........................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
[6]
(d) The teacher stores the database on the desktop computer in her classroom.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Explain the ways in which the teacher can use data backup and disk mirroring to limit the
amount of data lost in the event of hardware failure.
Data backup
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Disk mirroring
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
© UCLES 2020 9608/12/O/N/20 [Turn over
12
(a) Malika’s manager has asked her to work with a senior software engineer for the first week.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Malika researched the company and the programming languages used by the company
before she started the job.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) Malika thinks that her colleagues do not like her, so she asks her manager for help.
Describe the actions the manager could take to support Malika in an ethical way.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Characteristic IP address
IPv6
[2]
Explain the reasons for the web server using a static instead of a dynamic IP address.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
1 hour 30 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CJ) 188576/2
© UCLES 2020 [Turn over
2
1 Draw one or more lines to link each language translator to the most appropriate statement(s).
Compiler
Needs the source code to be present
when the user’s program is run
[3]
2 A veterinary surgery cares for sick animals. The surgery has a file-based database that stores
data about the pets, their owners, and appointments made with the surgery.
(a) Explain the reasons why the surgery should upgrade their database.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(i) Give one reason why the database design for SURGERY is not in Third Normal Form
(3NF).
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) The database needs to be normalised to 3NF. A pet may have more than one owner and
an owner may have more than one pet.
The appointment table does not need to change and has been repeated below.
Give the name and attributes of three additional tables in 3NF. Identify the primary
key(s) in each table.
Table 1 ...............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Table 2 ...............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Table 3 ...............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(c) Part of the table APPOINTMENT is shown. The veterinary surgery uses Data Manipulation
Language (DML) statements to search for appointments.
(i) Identify the industry standard language that provides both DML and Data Definition
Language (DDL) statements.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Write a DDL statement to update the table APPOINTMENT and define AppointmentID
as the primary key.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(iii) Complete the DML script to display the times and Pet IDs of all appointments on
02/02/2021 with staff ID of ‘JK1’, in descending order of time.
FROM APPOINTMENT
(d) New pet owners complete a paper-based form to register their pets at the surgery.
(i) Describe two verification checks that can be carried out when the data from the paper-
based form is entered into the database.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(ii) Appointments can be booked between 09:00 and 16:50 on Monday to Friday.
Describe the ways in which the appointment date and time can be validated to make
sure they are reasonable.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(e) The surgery has five computers that can all access the database. A copy of the database is
stored centrally.
(i) Complete the description of this type of network model by filling in the missing terms.
the data for the surgery. The other computers are ......................................... . When a
(ii) The surgery wants to keep all data secure. The surgery network is not connected to the
Internet.
Identify two authentication techniques the surgery could use to restrict access to the
data.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
3 Ria manages a team of software developers. The team is creating a mobile application game for a
client.
Ria wants to ensure that her team works to the ACM/IEEE Software Engineering Code of Ethics.
(a) Explain the ways in which Ria and her team can ensure that they follow the Code of Ethics in
relation to the product and their colleagues.
(i) Product
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Colleagues
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(b) Ria’s client wants to sell the game for a profit. The client cannot decide which type of software
licence to use to distribute the game.
Identify two types of licence that Ria could recommend to her client and justify the use of
each licence.
Licence 1 ..................................................................................................................................
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Licence 2 ..................................................................................................................................
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
4 The following table shows assembly language instructions for a processor that has one general
purpose register, the Accumulator (ACC).
Instruction
Explanation
Op code Operand
Direct addressing. Load the contents of the location at the given address to
LDD <address>
ACC.
LDM #n Immediate addressing. Load the denary number n to ACC.
Indirect addressing. The address to be used is at the given address. Load
LDI <address>
the contents of this second address to ACC.
CMP <address> Compare the contents of ACC with <address>.
SUB <address> Subtract the contents of the given address from the contents of ACC.
OUT Output to screen the character whose ASCII value is stored in ACC.
JPE <address> Following a compare instruction, jump to <address> if the compare was True.
Address Instruction
100 LDD 200
101 ADD 201
102 ADD 202
103 SUB 203
104 STO 204
105 END
200 10
201 20
202 5
203 6
204
205
Tick (✓) one box to indicate which one of the following statements is true after program
execution.
Address Instruction
100 LDM #120
101 ADD 121
102 SUB 122
103 STO 120
104 END
120 10
121 2
122 4
123 6
124 8
125 10
Tick (✓) one box to indicate which one of the following statements is true after program
execution.
Address Instruction
150 LDI 200
151 ADD 200
152 ADD 201
153 STO 205
154 END
200 202
201 203
202 201
203 200
204
205
Tick (✓) one box to indicate which one of the following statements is true after program
execution.
(d) Identify two modes of addressing that are not used in parts (a), (b) or (c).
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
Tick (✓) one box on each row to indicate the appropriate instruction group for each assembly
language instruction.
STO 120
JPE 200
ADD 3
LDD 20
INC ACC
OUT
[3]
(a) The concert is streamed to his computer at the same time as it is taking place.
(i) Identify whether Oscar is using real-time or on-demand bit streaming. Justify your choice.
Justification .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(ii) The video of the concert repeatedly stops and restarts while Oscar is watching it on his
laptop computer. His friend is watching the same video of the concert at the same time,
in a different location, but he does not experience the same problem as Oscar.
Give three possible reasons why Oscar’s video constantly stops and starts again.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(b) The video of the concert is made up of a sound track and multiple images.
Two successive frames of one section of the video are shown. The pixel colours are
represented by letters.
BL BL BL RD RD RD BL BL BL RD RD RD
K K K K K K BL BL BL RD RD RD
LG LG LG DG DG DG LG LG LG DG DG DG
Y Y K Y Y K BK BK BK BK BK BK
W K W W W DG W K W W W DG
P P P P P P P P P P P P
Frame 1 Frame 2
(i) Explain the way in which progressive encoding can be used to transmit Frames 1 and 2.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Explain, using Frames 1 and 2 as an example, the way in which temporal redundancy
can be used to compress a video.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(iii) Give another type of redundancy technique that can be used to compress a video.
...........................................................................................................................................
..................................................................................................................................... [1]
(iv) MP4, WMV and AVI are all examples of a type of format that combines sound and image
components into a video.
Identify the type of format that combines the sound and image components into a video.
...........................................................................................................................................
..................................................................................................................................... [1]
© UCLES 2020 9608/11/O/N/20 [Turn over
14
6 (a) Convert the following denary number into a 12-bit two’s complement binary form.
-245
[1]
F0
...................................................................................................................................................
............................................................................................................................................. [1]
10101111
...................................................................................................................................................
............................................................................................................................................. [1]
(d) Convert the following Binary Coded Decimal (BCD) into denary.
100001010011
...................................................................................................................................................
............................................................................................................................................. [1]
7 Anne is downloading a sound file from a web server. She had the choice of a sampling rate of
44.1 kHz or 98 kHz before she downloaded the sound file.
Explain the differences between the two sound files stored on the server.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
(a) The laptop has a private IP address. The router has both public and private IP addresses.
Explain the reasons why Joshua’s laptop has a private IP address only, but the router has
both a private and a public IP address.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Joshua visits a website by entering its Uniform Resource Locator (URL).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
...................................................................................................................................................
............................................................................................................................................. [1]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC/TP) 171632/4
© UCLES 2019 [Turn over
2
1 In a supermarket, a self-checkout machine allows customers to scan the barcodes of products and
then pay for their shopping. These are an alternative to the traditional cashier-staffed checkout.
(i) Identify two other input devices that self-checkout machines have.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(ii) Identify two other output devices that self-checkout machines have.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
Write one of the letters A to D in each appropriate row to complete the sequence.
1 ............................
3 ............................
4 ............................
6 ............................
[2]
(i) Give two reasons why the self-checkout machine needs primary storage.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(ii) The self-checkout machines use Static RAM (SRAM) for their cache.
The following table has statements about SRAM or Dynamic RAM (DRAM).
Tick (✓) one box in each row to identify whether the statement is about SRAM or DRAM.
(c) The self-checkout machines connect to a server that stores all the data for the supermarket.
This is a client-server network.
(i) Describe, using an example for the supermarket, the client-server network model.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) The supermarket is concerned about the security and integrity of the data on the server.
Identify two methods that can be used to minimise the security risk to the data, and one
method to protect the integrity of the data.
Security 1 ..........................................................................................................................
...........................................................................................................................................
Security 2 ..........................................................................................................................
...........................................................................................................................................
Integrity .............................................................................................................................
...........................................................................................................................................
[3]
(a) Describe the following key management tasks that the mobile phone operating system carries
out.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
(i) Describe how sound sampling is used by the mobile phone to encode the sound.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Leonardo records his voice twice. Each recording is the same length and has the same
sampling resolution.
The first recording has a sampling rate of 44 100 Hz. The second recording has a
sampling rate of 21 000 Hz.
Describe how the different sampling rates will affect the recording and the sound file.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(iii) Leonardo transfers the recordings to his laptop computer. He uses sound editing
software to delete some sections of the recordings, and copy and paste to replicate other
sections.
Describe two other features of sound editing software Leonardo can use to edit the
recordings.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(a) The hotel has two types of room: double and family. Each room has a unique room number.
The hotel stores information about the customers including their name, address and contact
details.
When a customer books a room, they give the start date and the number of nights they want
to stay. If a customer wants more than one room, each room must have a separate booking.
Each booking has an ID number.
The hotel creates a normalised, relational database to store the required information. There
are three tables:
• CUSTOMER
• ROOM
• BOOKING
(i) Complete the database design for the hotel by writing the attributes for each table.
CUSTOMER( .......................................................................................................................
...........................................................................................................................................
........................................................................................................................................ )
ROOM( ...............................................................................................................................
...........................................................................................................................................
........................................................................................................................................ )
BOOKING( .........................................................................................................................
...........................................................................................................................................
........................................................................................................................................ )
[3]
(ii) Identify the primary key for each table that you designed in part (a)(i).
CUSTOMER .........................................................................................................................
ROOM ..................................................................................................................................
BOOKING ...........................................................................................................................
[2]
(iii) Identify one foreign key in the tables that you designed in part (a)(i).
(b) The hotel wants to use a Database Management System (DBMS) to set up and manage the
database.
Describe, using examples, how the hotel can use the following DBMS tools:
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[5]
Tick (✓) one box in each row to identify whether the script is an example of a Data Definition
Language (DDL) statement or a Data Manipulation Language (DML) statement.
4 (a) Convert the unsigned binary number 0101 1111 1100 into denary.
............................................................................................................................................. [1]
(b) Convert the denary number −239 into 12-bit two’s complement.
............................................................................................................................................. [1]
(c) Convert the two’s complement number 0110 0101 into denary.
............................................................................................................................................. [1]
(d) Convert the Binary Coded Decimal (BCD) value 0110 0101 into denary.
............................................................................................................................................. [1]
............................................................................................................................................. [1]
B X
[5]
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
One of the web pages includes the following JavaScript code and HTML tags.
01 <html>
02 <body>
03 <form>
04 <p id="displayQuestion"></p>
05 <input type="text" id="answer">
06 <button id="submit" onclick="checkAnswer()"> Submit </button>
07 </form>
08 </body>
09 <script>
10 val1 = Math.floor((Math.random() * 10) + 1);
11 val2 = Math.floor((Math.random() * 10) + 1);
12 document.getElementById("displayQuestion").innerHTML = "What is" +
val1.toString() + "*" + val2.toString() + "?";
13 function checkAnswer(){
14 userAnswer = document.getElementById("answer").value;
15 answer = val1 * val2
16 if (userAnswer == answer.toString()){
17 alert("Correct, well done");
18 }else{
19 alert("Sorry that's incorrect");
20 }
21 }
22 </script>
23 </html>
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(ii) Identify every line number of the JavaScript code that generates an output.
...........................................................................................................................................
..................................................................................................................................... [2]
(iii) Identify the line number of the JavaScript code that takes data the user has input and
stores it in a variable.
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(b) Willow used functions from a JavaScript program library in the web page.
Describe the benefits to Willow of using program libraries to create the web page.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Complete the table by writing the name of the addressing mode for each description.
Form the address by adding the given number to a base address. Load
the contents of the calculated address to the Accumulator (ACC).
Load the contents of the address held at the given address to ACC.
Form the address from the given address + the contents of the Index
Register. Load the contents of the calculated address to ACC.
[5]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC/CB) 171631/1
© UCLES 2019 [Turn over
2
1 (a) The diagram shows different types of software on the left, and descriptions on the right.
Operating system
Utility program
Library program
Compiler
[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
B
X
[4]
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
01 <html>
02 <body>
03
04 <form>
05 <p><input type="text" id="textBox1"></p>
06 <button id = "button1" onclick="multiply()">First</button>
07 <button id = "button2" onclick="addition()">Second</button>
08 </form>
09
10 </body>
11 <script>
12 function multiply(){
13 value1 = document.getElementById("textBox1").value;
14 value1++;
15 alert(parseInt(value1)* parseInt(value1));
16 }
17
18 function addition(){
19 value1 = document.getElementById("textBox1").value;
20 alert(parseInt(value1) + parseInt(value1));
21 }
22 </script>
23 </html>
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
............................................................................................................................................. [1]
...................................................................................................................................................
............................................................................................................................................. [1]
20 alert(value1 + value1);
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(a) Anushka has a file-based storage system. She wants a relational database.
(i) Describe the features of a relational database that address the limitations of Anushka’s
file-based system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) The relational database design needs to be normalised. The following statements
describe the three stages of database normalisation.
groups of attributes.
For a database to be in Second Normal Form (2NF), it must be in 1NF, and contain no
For a database to be in Third Normal Form (3NF), it must be in 2NF, and all attributes
(b) The normalised relational database, SPORTS_CLUB, has the following table design.
MEMBER_SESSION(MemberID, SessionID)
SESSION_TRAINER(SessionID, TrainerID)
MEMBER SESSION
MEMBER_SESSION SESSION_TRAINER
TRAINER
[2]
(ii) Anushka first needs to create the database that she has designed.
...........................................................................................................................................
..................................................................................................................................... [1]
(iii) The table shows some sample data for the table SESSION.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
(iv) Write a Data Manipulation Language (DML) script to return the first name and last name
of all members who have Peak membership type.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
5 Mica has created some software and has copyrighted it. She wants to stop other people from
copying and changing it illegally.
(a) Identify two ways Mica can prevent illegal copies of the software being installed.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Identify one way Mica can distribute the software without the source code.
...................................................................................................................................................
............................................................................................................................................. [1]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
6 Dominic uses a tablet computer to complete work. He records videos of his work to send to his
colleagues to watch at a later date.
(i) The table lists four devices built into the tablet.
Tick (✓) one or more boxes for each device to identify whether it is an input device, an
output device or both.
Touchscreen
Webcam
Microphone
Fingerprint scanner
[2]
Letter Statement
Changes in the audio signal cause the direction of the electrical current to change.
A
This determines the polarity of the electromagnet.
Write one of the letters A to E in each appropriate row to complete the sequence.
1 ............................
2 ............................
4 ............................
5 ............................
7 ............................
[4]
(b) The tablet computer’s secondary storage is solid state (flash) memory.
(i) Give one reason why the tablet computer needs secondary storage.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
RAM ..........................................................................................................................................
...................................................................................................................................................
ROM .........................................................................................................................................
...................................................................................................................................................
[2]
(d) Dominic’s tablet captures a video of Dominic to send to other people. The video is made of a
sequence of images and a sound file.
(i) Describe how the images and sound are encoded into a digital form.
Images ..............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Sound ................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
© UCLES 2019 9608/12/O/N/19
13
(ii) The sequence of images and the sound file create a video. This is sent over the Internet
as a video stream. The video stream can use interlaced encoding or progressive
encoding.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(e) Dominic sends his videos to his colleagues over the Internet using bit streaming.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) Circle either Real-time or on-demand to identify whether the video will be sent using
real-time or on-demand bit streaming. Justify your choice.
Real-time / on-demand
Justification .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
© UCLES 2019 9608/12/O/N/19 [Turn over
14
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (LEG/CB) 171630/4
© UCLES 2019 [Turn over
2
(a) The diagram has registers used in Von Neumann architecture on the left and descriptions on
the right.
Draw one line to match each register with its correct description.
Register Description
Program Counter
Stores the address of the next instruction to
be read
[4]
(b) Many components of the computer system transfer data between them using buses. One
example of a bus is an address bus.
(i) Name two other buses that exist within a computer and give the purpose of each.
Bus 1 .................................................................................................................................
Purpose .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Bus 2 .................................................................................................................................
Purpose .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(ii) State the benefit of increasing the address bus width from 16 bits to 32 bits.
...........................................................................................................................................
..................................................................................................................................... [1]
The processor’s instruction set can be put into several groups. One of these groups is
........................................................... .
[3]
(a) Aaron has a mouse and keyboard that he can use as input devices and a monitor as an
output device.
(i) Identify two additional input devices Aaron could use with his desktop computer.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(ii) Identify two additional output devices Aaron could use with his desktop computer.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(iii) Aaron needs to store a large number of applications and data on his computer. He needs
at least 50GB of secondary storage space.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(b) Aaron’s computer has an operating system (OS). The OS manages the running processes
and provides a user interface.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(d) Aaron creates a web page using JavaScript code and HTML tags.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
3 (a) A bank approves a customer for an account based on the criteria in the following table.
1 True
A Employed
0 False
1 True
B Self-employed
0 False
1 True
C Over 21
0 False
1 True
D Earn more than 30 000
0 False
1 True
E Another account
0 False
C X
[5]
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
4 Customers of a bank can access their account information by logging in on the bank’s website.
(i) Describe, using the bank as an example, the key features of a client-server model.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(ii) Give two other examples of applications that can use the client-server model.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(b) The bank’s customers log in to the website using a web application.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) The bank is upgrading its local area network (LAN) copper cables to fibre-optic cables.
(i) State two benefits to the bank of upgrading to fibre-optic cable from copper cable.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(d) The bank uses a relational database, ACCOUNTS, to store the information about customers
and their accounts.
The database stores the customer’s first name, last name and date of birth.
The bank has several different types of account. Each account type has a unique ID number,
name (for example, regular or saving) and bonus (for example, $5.00, $10.00 or $15.00).
Each customer’s account has its own ID number and stores the amount of money the
customer has in that account.
The bank creates a normalised, relational database to store the required information. There
are three tables:
• CUSTOMER
• ACCOUNT_TYPE
• CUSTOMER_ACCOUNT
(i) Write the attributes for each table to complete the database design for the bank.
CUSTOMER( .......................................................................................................................
...........................................................................................................................................
.........................................................................................................................................)
ACCOUNT_TYPE( ..............................................................................................................
...........................................................................................................................................
.........................................................................................................................................)
CUSTOMER_ACCOUNT( ......................................................................................................
...........................................................................................................................................
.........................................................................................................................................)
[3]
(ii) Identify the primary key for each table that you designed in part (d)(i).
CUSTOMER .........................................................................................................................
ACCOUNT_TYPE ................................................................................................................
CUSTOMER_ACCOUNT ........................................................................................................
[2]
(iii) Identify one foreign key in one of the tables that you designed in part (d)(i).
Write the correct database term in the table for each definition.
Definition Term
5 (a) The bit depth of an image dictates how many different colours can be represented by each
pixel.
(i) State the number of different colours that can be represented by a bit depth of 8 bits.
..................................................................................................................................... [1]
..................................................................................................................................... [1]
(b) Convert the denary number −194 into 12-bit two’s complement.
............................................................................................................................................. [1]
(c) (i) Convert the Binary Coded Decimal (BCD) value 0110 1001 into denary.
..................................................................................................................................... [1]
...........................................................................................................................................
..................................................................................................................................... [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Tick (✓) one box in each scenario to identify whether lossy or lossless compression should
be used. Justify your choice.
Lossy Lossless
Justification .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
Lossy Lossless
Justification .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(iii) You need to upload a video that you have created to a website.
Lossy Lossless
Justification .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC) 163550/3
© UCLES 2019 [Turn over
2
(a) The following table lists key management tasks performed by an operating system and
their descriptions.
Complete the table by writing the missing management task names and descriptions.
Memory management
Provision of a software
platform
[4]
(b) A hard disk formatter and a hard disk defragmenter are two examples of utility software.
(i) Describe the actions performed by a hard disk formatter and a hard disk defragmenter.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(ii) Identify three other examples of utility software that can be installed on the computer.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Describe two non-physical methods used to improve the security of computer systems.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
(c) A computer uses parity blocks to check the data that has been received is the same as the
data that has been transmitted.
Parity
Data
bit
1 1 1 1 0 0 0 1
0 0 0 0 1 1 1 0
1 1 0 1 1 0 0 1
Parity
1 1 0 1 1 0 0 1
byte
(i) Describe how a parity block check can identify a bit that has been corrupted during
transmission.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) Give a situation where a parity block check cannot identify corrupted bits.
...........................................................................................................................................
..................................................................................................................................... [1]
(d) One principle of the ACM/IEEE Software Engineering Code of Ethics is to always act in the
best interest of the client.
Explain how Frankie can ensure that he is acting in the best interest of his client.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(e) When the program is complete, Frankie uses a compiler to prepare the program for the client.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
3 A company uses a relational database, EMPLOYEES, to store data about its employees and
departments.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(b) Relationships are created between tables using primary and foreign keys.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
EMPLOYEE_DATA
DEPARTMENT_MANAGER DEPARTMENT
[3]
(d) Give three reasons why the EMPLOYEES database is fully normalised.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(i) Write a Data Definition Language (DDL) statement to create the EMPLOYEES database.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Write a DDL statement to define the table EMPLOYEE_DATA, and declare EmployeeID
as the primary key.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
(iii) Write a Data Manipulation Language (DML) statement to return the first name and last
name of all female employees in the department named Finance.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
(a) The op codes LDM and LDD are used to load a register. The op code LDM uses immediate
addressing, and the op code LDD uses direct addressing.
LDM #300
...................................................................................................................................................
...................................................................................................................................................
LDD 300
...................................................................................................................................................
...................................................................................................................................................
[2]
Tick (✓) one box in each row to indicate the group each instruction belongs to.
(i) Give one example of a hardware interrupt and one example of a software interrupt.
Hardware ...........................................................................................................................
...........................................................................................................................................
Software ............................................................................................................................
...........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
(a) The images are bitmap images. A bitmap image can be made up of any number of colours.
Each colour is represented by a unique binary number.
Draw one line from each box on the left, to the correct box on the right to identify the minimum
number of bits needed to store each maximum number of colours.
1
68
2
256
127
2
8
249
9
[3]
(b) One of the videos has a frame rate of 40 fps (frames per second).
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) One video uses interlaced encoding, and a second video uses progressive encoding.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(c) The sound track has a sampling rate of 88.2 kHz and a sampling resolution of 32 bits.
State what is meant by a sampling rate of 88.2 kHz and a sampling resolution of 32 bits.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC) 163549/4
© UCLES 2019 [Turn over
2
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
..................................................................................................................................... [1]
C100:2235::1000:25AA:AA50
Explain why this IPv6 address would be an invalid IPv4 address.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(b) A company has computers in two separate buildings that communicate using the Internet
over a Public Switched Telephone Network (PSTN).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) The company wants to install a dedicated line between the two buildings.
Identify one benefit and one drawback of installing a dedicated line between the two
buildings.
Benefit ...............................................................................................................................
...........................................................................................................................................
Drawback ..........................................................................................................................
...........................................................................................................................................
[2]
© UCLES 2019 9608/12/M/J/19
3
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
...........................................................................................................................................
..................................................................................................................................... [1]
State two benefits of Biyu using an interpreter instead of a compiler while writing the
program.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
..................................................................................................................................... [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
01 MAR [PC]
02 PC [PC] - 1
03 MDR [MAR]
04 CIR [MAR]
Identify the line number of each error and give the correction.
Correction .................................................................................................................................
Correction .................................................................................................................................
Correction .................................................................................................................................
[3]
(b) A processor’s instruction set can be grouped according to their function. For example, one
group is the input and output of data.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(c) The following table shows assembly language instructions for a processor which has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Explanation
Op code Operand
LDM #n Immediate addressing. Load the denary number n to ACC
Direct addressing. Load the contents of the location at the given address to
LDD <address>
ACC
Indexed addressing. Form the address from <address> + the contents of the
LDX <address>
Index Register. Copy the contents of this calculated address to ACC
LDR #n Immediate addressing. Load the denary number n to IX
STO <address> Store contents of ACC at the given address
ADD <address> Add the contents of the given address to ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP #n Compare contents of ACC with denary number n
JPE <address> Following a compare instruction, jump to <address> if the compare was True
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
OUT Output to the screen the character whose ASCII value is stored in ACC
END Return control to the operating system
The current contents of the main memory, Index Register (IX) and selected values from the
ASCII character set are:
IX 0
© UCLES 2019 9608/12/M/J/19
7
Trace the program currently in memory using the following trace table.
The first instruction has been completed for you.
2 5 0 4 64 0
50 0
[8]
(i) Convert the denary ASCII character code for ‘A’ into 8-bit binary.
[1]
(ii) Convert the denary ASCII character code for ‘A’ into hexadecimal.
..................................................................................................................................... [1]
..................................................................................................................................... [1]
4 Shazia is creating a computer program that will be released to the public. The program includes a
video.
(a) Shazia uses a microphone to record a sound track for the video.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(ii) The script for the sound track is printed using a laser printer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) Shazia’s computer has Dynamic RAM (DRAM) and Static RAM (SRAM).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Shazia does not want to release the software as open source.
Explain why Shazia does not want to use an open source licence.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(iii) Name and describe two software licences, other than open source that Shazia could
use.
Licence 1 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Licence 2 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(a) Moheem has been told a relational database addresses some of the limitations of a file-based
approach by reducing data redundancy.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Explain how a relational database can help to reduce data redundancy.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(b) Moheem uses a Database Management System (DBMS) to ensure the security and integrity
of the data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
Feature 1 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Feature 2 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
© UCLES 2019 9608/12/M/J/19 [Turn over
12
(iii) The DBMS provides software tools for the database developer.
Fill in the names of the missing software tools in the following statements.
B X
[5]
(b) Complete the truth table for the logic expression in part (a).
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC) 163548/3
© UCLES 2019 [Turn over
2
Circle either Valid or Invalid to indicate whether each address is valid or invalid. Explain your
decision.
Explanation ...............................................................................................................................
...................................................................................................................................................
Explanation ...............................................................................................................................
...................................................................................................................................................
Explanation ...............................................................................................................................
...................................................................................................................................................
[3]
(b) A website can be accessed using either the Uniform Resource Locator (URL) or the IP
address.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Complete the following statements by filling in the names of the missing methods of bit
streaming.
................................................. bit streaming is used when watching an event that has taken
place in the past. Existing media are encoded to bit streaming format and uploaded to a
server. It can be paused and rewound.
[2]
© UCLES 2019 9608/11/M/J/19
3
(d) A recording of a concert is stored as a file. The file is compressed using lossy compression
before it is streamed to users.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
2 A software company produces software and distributes it under different software licences.
Write the type of software licence that best fits each description. Use a different type of licence
for each description.
1. The software can be legally used, only after a fee has been paid.
2. The source code comes with the software. If the software is modified, the edited source
code must be released under the same conditions as the original software.
3. The software is free for a trial period and then a fee is requested, or expected, if the user
wants to continue to use the software.
4. The source code comes with the software. The software is free to be downloaded, edited,
and distributed, possibly without restriction.
(b) The software company stores information about customers and the software licences they
have purchased. The company considers a file-based approach for the storage and retrieval
of data.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(ii) The software company decides to use a database to overcome the limitations of a
file-based system. Some of these limitations are addressed through the logical schema.
Name 1 ..............................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
Name 2 ..............................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
[4]
CUSTOMER(CustomerID, CompanyName)
(i) Identify the type of relationship that exists between the tables CUSTOMER and LICENCE.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Describe how the relationship is created between the tables CUSTOMER and LICENCE.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(iii) The company needs a list of all software licences that have an expiry date on or before
31/12/2019.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(i) State one benefit of Kimmy using an interpreter during the development of the program.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) State three benefits of Kimmy using a compiler when the program is complete.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(a) Two principles of the ACM/IEEE Software Engineering Code of Ethics are:
Name and describe three other principles in the ACM/IEEE Software Engineering Code of
Ethics.
Principle 1 .................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Principle 2 .................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Principle 3 .................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
(b) The software development company uses data backup and disk-mirroring to keep their data
secure.
Explain how data backup and disk-mirroring allow the company to recover from data loss.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Disk-mirroring ...........................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2019 9608/11/M/J/19
9
(a) The table contains some of the tasks performed by a two-pass assembler.
Tick (✓) one box in each row to indicate whether the task is performed at the first or second
pass. The first row has been completed for you.
(b) The processor’s instruction set can be grouped according to their function. For example, one
group is modes of addressing.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(c) The table shows assembly language instructions for a processor which has one general
purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Explanation
Op code Operand
LDM #n Immediate addressing. Load the denary number n to ACC.
Direct addressing. Load the contents of the location at the given address to
LDD <address>
ACC.
Indexed addressing. Form the address from <address> + the contents of the
LDX <address>
Index Register. Copy the contents of this calculated address to ACC.
LDR #n Immediate addressing. Load the denary number n to IX.
STO <address> Store contents of ACC at the given address.
ADD <address> Add the contents of the given address to ACC.
INC <register> Add 1 to the contents of the register (ACC or IX).
CMP #n Compare contents of ACC with denary number n.
JPE <address> Following a compare instruction, jump to <address> if the compare was True.
JPN <address> Following a compare instruction, jump to <address> if the compare was False.
JMP <address> Jump to the given address.
OUT Output to screen the character whose ASCII value is stored in ACC.
END Return control to the operating system.
The current contents of the main memory, Index Register (IX) and selected values from the
ASCII character set are:
IX 0
© UCLES 2019 9608/11/M/J/19
11
Trace the program currently in memory using the following trace table. The first instruction
has been completed for you.
65 67 69 69 68 33 0
20 0
[8]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) State one benefit of using interlaced encoding compared to progressive encoding.
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(ii) Explain how the sampling rate and sampling resolution affect the file size of the sound
track.
...........................................................................................................................................
...........................................................................................................................................
[2]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC/SW) 144491/4
© UCLES 2018 [Turn over
2
(a) The designer creates a 6-colour bitmap image for the poster as shown.
R R P P P G
B R R P G G
B W B B O O
B W W P P O
B B R P G O
B R R P G O
(i) State the minimum number of bits needed to represent each pixel in the image in part (a).
.......................................................................................................................................[1]
(ii) Calculate the minimum file size of the image shown in part (a). Show your working.
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(b) (i) The designer takes a photograph to put on the poster. The photograph has a resolution of
50 000 pixels by 50 000 pixels. The colours are represented using 4 bytes per pixel.
Estimate the file size of the photograph in gigabytes. Show your working.
Working ..............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(ii) The photograph needs to be sent by email but the file size is too big. It needs to be
compressed.
The table lists several methods of making an image file size smaller.
Tick (✓) one box on each row to indicate whether each method is lossy or lossless.
[4]
(c) Explain how run-length encoding would compress the image in part (a).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
2 The following table shows assembly language instructions for a processor which has one general
purpose register, the Accumulator (ACC) and an Index Register (IX).
Instruction
Explanation
Op code Operand
Direct addressing. Load the contents of the location at the given address
LDD <address>
to ACC.
Indexed addressing. Form the address from <address> + the contents of
LDX <address>
the Index Register. Copy the contents of this calculated address to ACC.
LDR #n Immediate addressing. Load the number n to IX.
STO <address> Store contents of ACC at the given address.
ADD <address> Add the contents of the given address to ACC.
INC <register> Add 1 to the contents of the register (ACC or IX).
DEC <register> Subtract 1 from the contents of the register (ACC or IX).
CMP <address> Compare contents of ACC with contents of <address>.
Following compare instruction, jump to <address> if the compare was
JPE <address>
True.
Following compare instruction, jump to <address> if the compare was
JPN <address>
False.
JMP <address> Jump to the given address.
OUT Output to the screen the character whose ASCII value is stored in ACC.
END Return control to the operating system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
X 1 1 1 1 0 0 1 0
.......................................................................................................................................[1]
.......................................................................................................................................[1]
.......................................................................................................................................[1]
(iv) Show the result on the general purpose register (X) after the following instruction is run.
INC X
[1]
(c) The current contents of the main memory, Index Register (IX) and selected values from the
ASCII character set are provided with a copy of the instruction set.
Complete the trace table for the given assembly language program.
[7]
3 This question presents three scenarios. Tick (✓) one box for each scenario to indicate whether
you think the person’s behaviour is ethical or unethical. Justify your choice.
(a) Mason is using his work computer to book a holiday whilst at work.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Ethan is supervising a trainee. The trainee asks Ethan for a reference for another job. Ethan
does not want to lose the trainee, so refuses to give him a reference.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) Margarita finds that one of her team members has produced some inventive code. She
presents this to her manager, praising the individual by name.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
4 Ava needs to view a website and she knows the Uniform Resource Locator (URL).
1 ..................................................
3 ..................................................
4 ..................................................
1 .........................................................................................................................................
...........................................................................................................................................
2 .........................................................................................................................................
...........................................................................................................................................
[2]
1 .........................................................................................................................................
...........................................................................................................................................
2 .........................................................................................................................................
...........................................................................................................................................
[2]
Tick (✓) one box in each row to identify whether each description applies to a public or private
IP address.
5 Arnold is a software developer. He has created a computer game for people to download over the
Internet. Arnold is considering releasing the game as a piece of commercial software.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Name and describe one other type of licence that Arnold can consider using.
Description .........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(b) Users need to enter their name and email address to create an account. The information is
stored in a database on Arnold’s computer.
Give three ways that Arnold can ensure users’ details are kept secure.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(a) The stages in the FE cycle are shown in register transfer notation.
MAR [...............]
PC PC + 1
............... [ [MAR] ]
............... [MDR]
Write the missing register names in the spaces in part (a). [3]
...........................................................................................................................................
.......................................................................................................................................[1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) There are two types of RAM: dynamic RAM (DRAM) and static RAM (SRAM).
The following table shows five statements about DRAM and SRAM.
Tick (✓) one box in each row to indicate whether the statement applies to DRAM or SRAM.
Does not need to be refreshed as the circuit holds the data while the power
supply is on
7 The network manager of a Local Area Network (LAN) has replaced the Ethernet cables with a
wireless network.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
...................................................................................................................................................
...............................................................................................................................................[1]
B X
[4]
(b) Complete the truth table for the logic expression in part (a).
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NF/CGW) 144492/3
© UCLES 2018 [Turn over
2
(a) The company creates a 4-colour bitmap image for the website as shown.
G R G K W R
G R G K W R
G R G K W R
G R G K W R
G G G K K R
W W W W K R
(i) State the minimum number of bits needed to represent each pixel in the image in part (a).
...................................................................................................................................... [1]
(ii) Calculate the minimum file size of the image shown in part (a). Show your working.
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(b) The company takes a photograph of their office to put on the website. The photograph has
a resolution of 1000 pixels by 1000 pixels. Two bytes per pixel are used to represent the
colours.
(i) Estimate the file size of the photograph in megabytes. Show your working.
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(ii) The file size of the photograph needs to be reduced before it is placed on the website.
Draw lines to link each method of reducing the file size of the image to:
Removes pixels
Crop the
photograph
Reduces number of
Lossy
pixels per inch
Use run-length
encoding
Uses fewer bits per
Lossless
pixel
Use fewer
colours
Stores colour code and
count of repetitions
[5]
(c) The company has created a logo for the website. The logo is a vector graphic.
Describe two reasons why a vector graphic is a sensible choice for the logo.
Reason 1 ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Reason 2 ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
2 Gopal types the Uniform Resource Locator (URL) of a website into a web browser.
(a) The following sequence (1 to 5) describes the steps that take place. There are three missing
statements.
2 ......................................
4 ......................................
5 ......................................
Write one of the letters A to C in the appropriate rows (2, 4 and 5) to complete the sequence.
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
3 The following table shows assembly language instructions for a processor which has one general
purpose register, the Accumulator (ACC) and an Index Register (IX).
Instruction
Explanation
Op code Operand
LDD <address> Direct addressing. Load the contents of the location at the given address to
ACC.
LDX <address> Indexed addressing. Form the address from <address> + the contents of the
Index Register. Copy the contents of this calculated address to ACC.
LDR #n Immediate addressing. Load the number n to IX.
STO <address> Store contents of ACC at the given address.
ADD <address> Add the contents of the given address to ACC.
INC <register> Add 1 to the contents of the register (ACC or IX).
DEC <register> Subtract 1 from the contents of the register (ACC or IX).
CMP <address> Compare contents of ACC with contents of <address>.
JPE <address> Following compare instruction, jump to <address> if the compare was True.
JPN <address> Following compare instruction, jump to <address> if the compare was False.
JMP <address> Jump to the given address.
OUT Output to the screen the character whose ASCII value is stored in ACC.
END Return control to the operating system.
(a) (i) State what is meant by absolute addressing and symbolic addressing.
...........................................................................................................................................
...........................................................................................................................................
[2]
(ii) Give an example of an ADD instruction using both absolute addressing and symbolic
addressing.
(b) (i) State what is meant by indexed addressing and immediate addressing.
...........................................................................................................................................
...........................................................................................................................................
[2]
X 1 1 0 0 0 0 0 1
...................................................................................................................................... [1]
...................................................................................................................................... [1]
...................................................................................................................................... [1]
(d) The current contents of the main memory, Index Register (IX) and selected values from the
ASCII character set are:
100 2
101 302
102 303
103 303
104 0
105 303
IX 1
Instruction
Explanation
Op code Operand
LDD <address> Direct addressing. Load the contents of the location at the given address to
ACC.
LDX <address> Indexed addressing. Form the address from <address> + the contents of the
Index Register. Copy the contents of this calculated address to ACC.
LDR #n Immediate addressing. Load the number n to IX.
STO <address> Store contents of ACC at the given address.
ADD <address> Add the contents of the given address to ACC.
INC <register> Add 1 to the contents of the register (ACC or IX).
DEC <register> Subtract 1 from the contents of the register (ACC or IX).
CMP <address> Compare contents of ACC with contents of <address>.
JPE <address> Following a compare instruction, jump to <address> if the compare was True.
JPN <address> Following a compare instruction, jump to <address> if the compare was False.
JMP <address> Jump to the given address.
OUT Output to the screen the character whose ASCII value is stored in ACC.
END Return control to the operating system.
Complete the trace table for the given assembly language program.
[7]
4 A student has written the steps of the fetch stage of the fetch-execute (FE) cycle in register transfer
notation. The student has made some errors.
Line 2 PC PC + 1
Line 4 CIR PC
(a) Identify the line numbers of three errors that the student has made. Write the correct notation
for each error.
[3]
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(ii) Explain how interrupts are handled during the fetch-execute cycle.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [5]
© UCLES 2018 9608/12/O/N/18
11
Bus Description
Control bus
Unidirectional
(one direction)
Address bus
Bidirectional
(two directions)
Data bus
[2]
5 This question presents three scenarios. For each scenario, tick (✓) one box to show whether you
think the person’s behaviour is ethical or unethical. Justify your choice.
(a) Wendy is a software engineer who is developing a program for her company. Her friend,
Noah, is developing a program for a different company. Wendy looks at the code that Noah is
writing to get ideas for her own program.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(b) Amit is fixing some bugs in the computer system of a large multinational company. He is
asked to sign a confidentiality agreement. He sees some confidential information which
contains the names of other multinational companies that have broken the law. He copies this
information and releases it on the Internet.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(c) Farah is providing a company with an estimate for the cost of writing a program. The company
she works for is in financial difficulty so she increases the estimate by 10%.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(a) Kim needs to make sure the program is secure against unauthorised access. She has already
set up a username and password on her laptop.
Identify two additional electronic measures that Kim can use to keep the program secure.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
(ii) Describe one benefit and one drawback of using library routines.
Benefit ...............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Drawback ..........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(c) Kim develops her program and makes it ready for use. To do this, she uses first an interpreter
and then a compiler.
Interpreter .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Compiler ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (ST) 144490/3
© UCLES 2018 [Turn over
2
1 A student is creating a short video and needs to record music to play in the background.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
Explain how different sampling resolutions affect the sound file and the sound it represents.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
Describe two features of sound editing software that can be used to edit the sound file.
Feature 1 ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Feature 2 ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(d) The video is recorded with a frame rate of 60 frames per second (fps) and uses progressive
encoding.
...........................................................................................................................................
.......................................................................................................................................[1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...................................................................................................................................................
...............................................................................................................................................[1]
(a) State how Computer A could access the web page without using a Domain Name Service
(DNS).
...................................................................................................................................................
...............................................................................................................................................[1]
21E5:69AA:FFFF:1:E100:B691:1285:F56E
::255.255.255.255
59FB::1005:CC57:6571
56FE::2159:5BBC::6594
[4]
(ii) The following table shows four statements about either public or private IP addresses.
Tick (3) one box in each row to indicate whether each statement refers to a public or a
private IP address.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
3 Hugo has produced a program (app) for mobile phones. He needs to decide whether to use an
Open Source licence or to distribute the app as shareware.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Shareware ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(b) Tick (3) one box to indicate the licence Hugo should use. Justify your choice.
Open Source
Shareware
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
4 The table shows assembly language instructions for a processor which has one general purpose
register, the Accumulator (ACC) and an index register (IX).
Instruction
Explanation
Op code Operand
Direct addressing. Load the contents of the location at the given
LDD <address>
address to ACC.
Indexed addressing. Form the address from <address> + the
LDX <address> contents of the Index Register. Copy the contents of this calculated
address to ACC.
LDR #n Immediate addressing. Load the number n to IX.
STO <address> Store contents of ACC at the given address.
ADD <address> Add the contents of the given address to ACC.
INC <register> Add 1 to the contents of the register (ACC or IX).
DEC <register> Subtract 1 from the contents of the register (ACC or IX).
CMP <address> Compare contents of ACC with contents of <address>.
Following a compare instruction, jump to <address> if the compare
JPE <address>
was True.
Following a compare instruction, jump to <address> if the compare
JPN <address>
was False.
JMP <address> Jump to the given address.
OUT Output to the screen the character whose ASCII value is stored in ACC.
END Return control to the operating system.
(a) (i) State what is meant by direct addressing and indirect addressing.
...........................................................................................................................................
...........................................................................................................................................
[2]
(ii) Explain how the instruction ADD 20 can be interpreted as either direct or indirect
addressing.
...........................................................................................................................................
...........................................................................................................................................
[2]
(b) The assembly language instructions in the following table use either symbolic addressing or
absolute addressing.
Tick (3) one box in each row to indicate whether the instruction uses symbolic or absolute
addressing.
ADD 90
CMP found
STO 20
[2]
X 1 0 1 1 1 0 1 0
.......................................................................................................................................[1]
.......................................................................................................................................[1]
.......................................................................................................................................[1]
(d) The current contents of the main memory, Index Register (IX) and selected values from the
ASCII character set are provided with a copy of the instruction set.
Complete the trace table for the given assembly language program.
[8]
5 For each of the following scenarios, tick (3) one box for each scenario to indicate whether you
think the person’s behaviour is ethical or unethical. Justify your choice.
(a) Kevin is a software engineer who has recently started a job with a new company. He is using
program code from his previous employer in his new employer’s programs.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Nadya is a software developer. She has accepted a new job. She has never worked with
the programming languages used by this new company. Nadya is planning to increase her
knowledge of these programming languages before she starts her new job.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) Maria finds that one of her team members has produced some inventive code. She presents
this to her manager, stating that it was produced by the team. She does not mention the
individual’s name.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
01 <?php
02 if(isset($_GET['age'])) {
03 echo "Result: ", allowed($_GET['age']);
04 } else {
05 ?>
06
07 <form action="#" method="get">
08 Enter Age: <input type="text" name="age" /><br/>
09 <input type="submit" value="Calculate" />
10 </form>
11
12 <?php
13 }
14 function allowed($age) {
15 if($age <= 16) $message = "You need permission";
16 else if($age > 30) $message = "You are too old";
17 else $message = "Allowed";
18 return $message;
19 }
20 ?>
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Write the value assigned to $message if the user types 30 in the text box.
...............................................................................................................................................[1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
List the sequence of events that take place when a user requests a web page containing PHP
code.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
7 A movie theatre has a relational database that stores the movie schedule, and information about
the movies. The theatre has several screens that play movies at the same time.
The database has three tables to store information about the movies, the screens and the movie
schedule.
SCREEN(ScreenNumber, NumberSeats)
(a) Complete the entity-relationship (E-R) diagram to show the relationships between these
tables.
MOVIE SCREEN
MOVIESCHEDULE
[2]
(b) Explain how primary and foreign keys are used to link the tables in the movie theatre
database.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(c) The database needs to store the name of the company that produced each movie, for
example, Rocking Movies.
Write an SQL script to add the attribute ProductionCompany to the MOVIE table.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(d) Write an SQL script to display the title and rating of all movies scheduled to play on screen
number 3.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NH/SW) 144489/2
© UCLES 2018 [Turn over
2
01 <?php
02 if(isset($_GET['mark'])) {
03 echo "Grade: " . calculateGrade($_GET['mark']);
04 } else {
05 ?>
06
07 <form action="#" method="get">
08 Enter Mark: <input type="text" name="mark" /><br />
09 <input type="submit" value="Calculate" />
10 </form>
11
12 <?php
13 }
14
15 function calculateGrade($inputMark) {
16 $gradeChar = "U";
17 if($inputMark >= 80) $gradeChar = "A";
18 else if($inputMark >= 70) $gradeChar = "B";
19 else if($inputMark >= 60) $gradeChar = "C";
20 else if($inputMark >= 50) $gradeChar = "D";
21 else if($inputMark >= 40) $gradeChar = "E";
22 return $gradeChar;
23 }
24 ?>
(a) Give the identifier of two variables used in the PHP code.
Identifier 1 .................................................................................................................................
Identifier 2 .................................................................................................................................
[2]
(b) Give the line number where the PHP code produces an output.
...............................................................................................................................................[1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(d) State whether this PHP code will run client-side or server-side.
...............................................................................................................................................[1]
2 A company writes applications (apps) for smartphones. The company has a relational database,
PURPLEGAME, which stores the information for one of its online game apps.
The database has three tables to store player’s details, dates when they have logged into the app
and in-app purchase details.
(a) Draw the entity-relationship (E-R) diagram to show the relationships between the three tables.
[2]
State what is meant by data integrity. Give an example of how the manager can ensure data
integrity in the PURPLEGAME database.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) The database designer states that the PURPLEGAME database is in Third Normal Form (3NF).
Tick (3) one box to indicate whether this statement is true or false.
True False
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(d) (i) The following table shows some sample data for the PLAYER table.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[5]
(ii) The table, PLAYER, needs to be altered. A new field, DateOfBirth, needs to be added.
Write an SQL script to add the DateOfBirth field to the PLAYER table.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(a) Describe the role of the Arithmetic and Logic Unit (ALU) and Control Unit (CU) in the Von
Neumann model.
ALU ...........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
CU ............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(b) Describe the role of the Status Register and Program Counter (PC).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
PC .............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
1 1 0 0 0 0 0 1
.......................................................................................................................................[1]
.......................................................................................................................................[1]
(iii) The current contents of register H represent a two’s complement binary integer.
.......................................................................................................................................[1]
(iv) State why register H does not currently contain a Binary Coded Decimal (BCD).
...........................................................................................................................................
.......................................................................................................................................[1]
Parity
bit
0 1 1 1 0 1 0
[1]
(b) In the following parity block, the first column contains the parity bits, and the last row contains
the parity byte. A device transmits the data using even parity.
Parity
Data
bit
0 0 1 1 0 1 0 1
1 1 1 1 1 0 0 1
1 0 1 0 1 0 0 0
0 0 0 1 1 0 1 1
Parity
0 1 1 1 1 1 0 1
byte
[1]
Draw one line from each error detection measure to indicate whether it is verification or
validation.
Error detection measure
Type check
Checksum
[4]
© UCLES 2018 9608/13/M/J/18
9
5 (a) A student needs to design a logic circuit to model the requirements for membership of a
snooker club. Membership (X) depends on four criteria, as shown in the table:
Description of Binary
Parameter Condition
parameter value
1 True
A Over 18
0 False
1 True
B Recommended
0 False
1 True
C Full-time
0 False
1 True
D Retired
0 False
• is over the age of 18 and has been recommended by a pre-existing member and
• either is working full-time or is retired, but not both.
[3]
(b) Complete the truth table for the logic expression: X = (A XOR B) AND NOT C
A B C Working space X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(a) State the minimum number of bits needed to represent each pixel in this image.
...............................................................................................................................................[1]
(b) Run-length encoding (RLE) is used to store the image with the following colour codes.
Colour Code
Black 1A
White 3B
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
State the minimum number of bits needed to represent each pixel in the 30-colour image.
...............................................................................................................................................[1]
State the purpose of the file header. Give two examples of the file header contents.
Purpose ....................................................................................................................................
...................................................................................................................................................
Example 1 .................................................................................................................................
...................................................................................................................................................
Example 2 .................................................................................................................................
...................................................................................................................................................
[3]
Give three features of graphics software that can be used to edit the photograph.
Feature 1 ...................................................................................................................................
Effect .........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Feature 2 ...................................................................................................................................
Effect .........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Feature 3 ...................................................................................................................................
Effect .........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
7 A zoo has a computer system for the visitors to access multimedia content about the zoo and its
animals.
(a) The users interact with the computer system through touchscreens.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) (i) Give one output device, other than a touchscreen, that may be part of this computer
system.
.......................................................................................................................................[1]
(ii) Give two input devices, other than a touchscreen, that may be part of this computer
system. State how each device will be used by the visitors.
Device 1 .............................................................................................................................
Use ....................................................................................................................................
...........................................................................................................................................
Device 2 .............................................................................................................................
Use ....................................................................................................................................
...........................................................................................................................................
[4]
(c) Give the most appropriate secondary storage device for this computer system.
Device .......................................................................................................................................
Reason 1 ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Reason 2 ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[5]
(d) This computer system has Random Access Memory (RAM) and Read Only Memory (ROM).
State what will be stored in RAM and ROM for this computer system.
RAM ..........................................................................................................................................
...................................................................................................................................................
ROM ..........................................................................................................................................
...................................................................................................................................................
[2]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC/CGW) 144488/3
© UCLES 2018 [Turn over
2
(a) The OS performs a number of different tasks such as file management and peripheral
management.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(i) The following table lists four programs. Put one tick (3) in each row to indicate whether
or not the program is utility software.
Database
Virus checker
Web browser
Backup software
[4]
Program 1 .........................................................................................................................
Program 2 .........................................................................................................................
[2]
© UCLES 2018 9608/12/M/J/18
3
2 (a) A greenhouse control system has four input parameters (H, D, T, W) and two outputs (X, Y).
Description of
Parameter Binary value Condition
parameter
0 Too low
H Humidity
1 Acceptable
0 Night
D Day
1 Day
0 Too high
T Temperature
1 Acceptable
0 Closed
W Windows
1 Open
The fan turns on (Y = 1) if the temperature is too high and the windows are closed.
T
Y
[6]
(b) Complete the truth table for the logic expression: X = NOT A AND (B NAND C)
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
Parity
bit
0 1 0 0 0 0 0
[1]
(b) In the following data transmitted, the first column contains the parity bits, and the last row
contains the parity byte. A device transmits the data using even parity.
Parity
Data
bit
1 0 1 0 1 1 1 1
0 1 1 0 0 1 1 0
1 1 0 0 0 0 0 0
0 1 0 0 0 0 0 0
Parity
0 0 0 0 1 0 0 1
byte
[1]
Put one tick (3) in each row to indicate whether the measure is validation or verification.
Checksum
Format check
Range check
Double entry
Check digit
[5]
4 (a) The Accumulator is a register. The current contents of the Accumulator are:
1 1 0 1 1 0 1 1
.......................................................................................................................................[1]
.......................................................................................................................................[1]
(iii) The current contents of the Accumulator represent a two’s complement binary integer.
.......................................................................................................................................[1]
(b) The binary integer represents a character from the computer’s character set.
...........................................................................................................................................
.......................................................................................................................................[1]
(ii) Explain the differences between the ASCII and Unicode character sets.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
Calculate the ASCII code in hexadecimal for ‘Z’. Show your working.
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(a) Explain how an analogue sound wave is sampled to convert it into digital format.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) Explain the effects of increasing the sampling resolution on the sound file.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) The original sound was sampled at 44.1 kHz. The sample rate is changed to 22.05 kHz.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(d) The student uses sound editing software to edit the sound file.
Name two features of sound editing software the student can use to edit the sound file.
Feature 1 ...................................................................................................................................
Purpose .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Feature 2 ...................................................................................................................................
Purpose .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
01 <html>
02 <body>
03
04 <p>Enter your mark</p>
05 <input id="Mark" value="0">
06 <button onclick="calcGrade()">Enter</button>
07
08 <script>
09 function calcGrade() {
10 var mark, grade;
11 mark = document.getElementById("Mark").value;
12 if (mark >= 90) {
13 grade = "A"
14 } else if (mark >= 80) {
15 grade = "B"
16 } else if (mark >= 70) {
17 grade = "C"
18 } else if (mark >= 60) {
19 grade = "D"
20 } else if (mark >= 50) {
21 grade = "E"
22 } else {
23 grade = "U"
24 }
25 alert("Your grade is " + grade)
26 }
27 </script>
28
29 </body>
30 </html>
(a) Give the identifier of two variables used in the JavaScript code.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Give the line number where the JavaScript code produces an output.
...............................................................................................................................................[1]
...................................................................................................................................................
...............................................................................................................................................[2]
(d) (i) State whether this JavaScript code will be run client-side or server-side.
.......................................................................................................................................[1]
(ii) Explain the difference between client-side scripting and server-side scripting.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
7 A social media website has a relational database, WEBDATA, that stores the site’s information.
The database has three tables to store users’ details, and details of the images and text that they
post.
(a) (i) Explain how the relationship between the tables USER and PHOTO has been implemented.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Draw the entity-relationship (E-R) diagram to show the relationships between the three
tables.
[2]
Use an example from the database WEBDATA to explain what is meant by referential
integrity.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(c) The database has been normalised to Third Normal Form (3NF).
1NF ............................................................................................................................................
...................................................................................................................................................
2NF ............................................................................................................................................
...................................................................................................................................................
3NF ............................................................................................................................................
...................................................................................................................................................
[3]
(d) The following shows sample data from the USER table.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[5]
(ii) The database administrator needs to alter the USER table. A new field, Country, needs
to be added.
Write an SQL script to add the field Country to the USER table.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (LEG/FC) 144487/2
© UCLES 2018 [Turn over
2
Draw one or more lines from each communication media to the appropriate feature(s).
Fibre-optic cable
Radio waves
Copper cable
Satellite
Wireless transmission
[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(c) The finished logo is 500 pixels by 1000 pixels and uses 35 different colours.
Estimate the file size for the logo. Give your answer in kilobytes. Show your working.
Working .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Answer ......................................................................................................................................
[4]
State two benefits of a vector graphic compared to a bitmap image. Give a reason for each
benefit.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Reason 1 ..................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
Reason 2 ..................................................................................................................................
...................................................................................................................................................
[4]
(a) The OS performs a number of different tasks such as memory management and security
management.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(iii) State two tasks, other than memory management and security management that are
carried out by an OS.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
The following table lists four programs. Put one tick (✓) in each row to indicate whether or not
the program is utility software.
Disk Defragmenter
Word Processor
Library Program
Compression Software
[4]
4 (a) An alarm system (X) is enabled and disabled using either a switch (A) or a remote control (B).
There are two infra-red sensors (C, D) and one door pressure sensor (E).
Description of
Parameter Binary value Condition
parameter
1 Switch enabled
A Switch
0 Switch disabled
1 Remote enabled
B Remote control
0 Remote disabled
1 Activated
C Infra-red sensor
0 Not activated
1 Activated
D Infra-red sensor
0 Not activated
The alarm sounds (X = 1) if the alarm is enabled and any one or more of the sensors is
activated.
C
X
[3]
(b) Complete the truth table for the logic expression: X = A OR (B XOR C)
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
Server 1 ....................................................................................................................................
Server 2 ....................................................................................................................................
[2]
One student stated, ‘The Internet and the World Wide Web are the same thing’.
Tick (✓) one box to indicate whether this statement is true or false.
True False
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(c) Students use the college’s learning resource website. Several of the web pages include PHP
script.
Describe the sequence of events when a student requests a web page with embedded
server-side code.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
Parity
bit
1 0 1 1 0 1 0
[1]
(b) In the following parity block, the first column contains the parity bits, and the last row contains
the parity byte. A device transmits the data using even parity.
Parity
Data
bit
1 1 0 1 0 1 1 1
1 0 0 0 1 1 1 0
0 1 0 0 1 0 1 1
1 1 1 0 1 1 1 1
Parity
1 1 1 1 1 0 0 1
byte
[1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(c) The data received can contain errors that are not detected using parity bits.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2018 9608/11/M/J/18
13
(d) Parity is not the only method to verify the data has been sent correctly.
Name and describe one other method of data verification during data transfer.
Name ........................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
(a) Identify two input devices and one output device used in a games console.
(b) The games console has random access memory (RAM) and read only memory (ROM).
Difference 1 .......................................................................................................................
...........................................................................................................................................
Difference 2 .......................................................................................................................
...........................................................................................................................................
[2]
...........................................................................................................................................
.......................................................................................................................................[1]
...........................................................................................................................................
.......................................................................................................................................[1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) (i) Explain the purpose of the Memory Data Register (MDR).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Name two registers, other than the MDR, that are used in the fetch-execute cycle.
Register 1 ..........................................................................................................................
Register 2 ..........................................................................................................................
[2]
1 0 0 0 0 1 1 1
.......................................................................................................................................[1]
.......................................................................................................................................[1]
(iii) The current contents of register X stores a two’s complement binary integer.
.......................................................................................................................................[1]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (JP) 147948
© UCLES 2017 [Turn over
2
1 (a) Each of the following bytes represents an integer in two’s complement form.
-17
[1]
(iv) State in denary, the range of integer values that it is possible to represent in two’s
complement integers using a single byte.
(b) (i) Convert the following denary integer into Binary Coded Decimal (BCD).
653
.......................................................................................................................................[1]
(ii) A 3-digit BCD representation has been incorrectly copied. It is shown as:
0 1 0 0 1 1 1 0 0 0 1 0
State how you can recognise that this is not a valid BCD representation.
...........................................................................................................................................
.......................................................................................................................................[1]
...........................................................................................................................................
.......................................................................................................................................[1]
2 (a) The diagram shows three items of software that translate program code.
Draw one line from each context to the correct item of translation software.
Assembler
Interpreter
Compiler
...........................................................................................................................................
.......................................................................................................................................[1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
3 A Local Area Network is used by staff in a hospital to access data stored in a Database Management
System (DBMS).
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) A frequent task for staff is to key in new patient data from a paper document. The document
includes the patient’s personal ID number.
(i) The Patient ID is a seven digit number. The database designer decides to use a check
digit to verify each foreign key value that a user keys in for a Patient ID.
When a user assigns a primary key value to a Patient ID, the DBMS adds a modulus-11
check digit as an eighth digit. The DBMS uses the weightings 6, 5, 4, 3, 2 and 1 for
calculating the check digit. It uses 6 as the multiplier for the most significant (leftmost)
digit.
Show the calculation of the check digit for the Patient ID with the first six digits 786531.
(ii) Name and describe two validation checks that the DBMS could carry out on each
primary key value that a user keys in for a Patient ID.
Description .................................................................................................................
....................................................................................................................................
Description .................................................................................................................
....................................................................................................................................
[4]
4 (a) The diagram shows the components and buses found inside a typical Personal Computer
(PC).
General purpose
registers
D
Arithmetic Logic
E F
Unit (ALU)
For each label, choose the appropriate title from the following list. The title for label D is
already given.
• Control bus
• System clock
• Data bus
• Control unit
• Main memory
• Secondary storage
A ...........................................................................................................................................
B ...........................................................................................................................................
C ...........................................................................................................................................
D Address bus
E ...........................................................................................................................................
F ...........................................................................................................................................
[5]
(b) The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Op code Op code Explanation
Operand
(mnemonic) (binary)
LDM #n 1100 0001 Immediate addressing. Load number n to ACC.
Direct addressing. Load the contents of the given
LDD <address> 1100 0010
address to ACC.
Relative addressing. Move to the address n locations
LDV #n 1100 0011 from the address of the current instruction. Load the
contents of this address to ACC.
STO <address> 1100 0100 Store the contents of ACC at the given address.
DEC 1100 0101 Decrement the contents of ACC.
Output the character corresponding to the ASCII
OUTCH 1100 0111
character code in ACC.
Following a compare instruction, jump to <address> if
JNE <address> 1110 0110
the compare was False.
JMP <address> 1110 0011 (Unconditionally) jump to the given address.
CMP #n 1110 0100 Compare the contents of ACC with number n.
Complete the trace table for the following assembly language program.
Label Instruction
StartProg: LDV #CountDown
CMP Num1
ASCII code table (selected codes only)
JNE CarryOn
<Space> 3 B C X
JMP Finish
32 51 66 67 88
CarryOn: OUTCH
LDD CountDown
DEC
STO CountDown
JMP StartProg
Finish: LDM #88
OUTCH
END
CountDown: 15
32
51
67
Num1: 32
Trace table:
[5]
(c) The program given in part (b) is to be translated using a two-pass assembler.
The program has been copied here for you. The program now starts with a directive which
tells the assembler to load the first instruction of the program to address 100.
Label
ORG #0100
StartProg: LDV #CountDown
CMP Num1
JNE CarryOn
JMP Finish
CarryOn: OUTCH
LDD CountDown
DEC
STO CountDown
JMP StartProg
Finish: LDM #88
OUTCH
END
CountDown: 15
32
51
67
Num1: 32
On the first pass of the two-pass process, the assembler adds entries to a symbol table.
The following symbol table shows the first eleven entries, part way through the first pass.
The circular labels show the order in which the assembler made the entries to the symbol
table.
Symbol table
StartProg 1 100 2
CountDown 3 UNKNOWN 4
Num1 5 UNKNOWN 6
Finish 9 UNKNOWN 10
Explain how the assembler made these entries to the symbol table.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(d) The assembler software must then complete the second pass building up the executable file.
(i) Name the second table needed when the assembler software carries out the second
pass.
.......................................................................................................................................[1]
Machine code
Instruction Binary Hexadecimal
OUTCH 1100 0111 C7
JNE CarryOn A B
Each of the numbers A and B represents the complete instruction in two bytes, one byte for
the op code and one byte for the operand.
(ii) Use the following instruction set to write the numbers for A and B.
A (binary) ........................................................................................................................
B (hexadecimal) .............................................................................................................
[3]
Instruction
Op code Op code Explanation
Operand
(mnemonic) (binary)
LDM #n 1100 0001 Immediate addressing. Load number n to ACC.
Direct addressing. Load the contents of the given
LDD <address> 1100 0010
address to ACC.
Relative addressing. Move to the address n locations
LDV #n 1100 0011 from the address of the current instruction. Load the
contents of this address to ACC.
STO <address> 1100 0100 Store the contents of ACC at the given address.
DEC 1100 0101 Decrement the contents of ACC.
Output the character corresponding to the ASCII
OUTCH 1100 0111
character code in ACC.
Following a compare instruction, jump to <address> if
JNE <address> 1110 0110
the compare was False.
JMP <address> 1110 0011 (Unconditionally) jump to the given address.
CMP #n 1110 0100 Compare the contents of ACC with number n.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
(b) (i) The user is considering the purchase of a removable device for secondary storage.
.......................................................................................................................................[1]
(ii) Describe two possible uses for this device on a home Personal Computer (PC).
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
6 Raj has joined a software company as a trainee programmer. He was given the company’s Code
of Conduct document during his induction training. The handbook has a section headed ‘Ethical
Behaviour’.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
In his first week, Raj feels uncomfortable working with one of his colleagues. He is unfamiliar
with the programming language used by the team. Next week, he will be working on the site
of one of the company’s clients with a colleague. Raj is very nervous about working in an
unfamiliar workplace.
Raj has a review with his manager after his first three weeks.
The Code of Conduct document was produced by the Human Resources section. It closely
follows the ACM/IEEE Software Engineering Code of Ethics that uses these eight key
principles:
There are issues Raj will want to raise with his manager.
Issue 1
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Issue 2
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
7 A clinic is staffed by several doctors. The clinic serves thousands of patients. Each day and at any
one time, there is only one doctor in the clinic available for appointments.
The clinic stores patient, doctor and appointment data in a relational database.
(a) (i) Underline the primary key for each table in the following suggested table designs.
(ii) Complete the following entity-relationship (E-R) diagram for this design.
[2]
(b) The doctors are concerned that many patients make appointments but do not attend them.
Describe the changes to the table designs that could be made to store this information.
...................................................................................................................................................
...............................................................................................................................................[2]
(c) The doctors are about to set up a new clinic in the neighbouring village, SITE-B.
A new table is designed to store the ID of the doctor who is able to work at each site.
DOCTOR-AVAILABILITY(DoctorID, Site)
DoctorID Site
098 SITE-A
074 SITE-A
117 SITE-B
098 SITE-B
033 SITE-B
(i) State what this data shows about the availability of the doctor with the ID of 098.
...........................................................................................................................................
.......................................................................................................................................[1]
(ii) Opening a new clinic in the neighbouring village will not require any additional table for
storing appointments. It will need a change to the existing appointment table design.
APPOINTMENT( ................................................................................................................
................................................................................................................................... ) [1]
(d) The doctor with the ID of 117 has recently been allocated a new DoctorID of 017.
(i) Write an SQL script to update this doctor’s record in the database.
UPDATE .............................................................................................................................
SET .....................................................................................................................................
WHERE ...............................................................................................................................
[3]
(ii) Describe why this update could cause problems with the existing data stored.
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(e) Write an SQL script to display the date and time of all appointments made by the patient with
the PatientID of 556.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (ST/SW) 129950/3
© UCLES 2017 [Turn over
2
1 One of the tasks of the operating system (OS) is the management of the main memory of the
computer system.
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[6]
2 (a) The diagram shows three items of software that translate program code.
Draw one line from each context to the correct item of translation software.
Assembler
Interpreter
Compiler
[4]
(b) A programmer is developing software and has both a compiler and interpreter for the
high-level language used.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(ii) Benefits of an interpreter
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
3 A Local Area Network is used by school staff who access data stored in a Database Management
System (DBMS).
(a) (i) Explain the difference between security and privacy of data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
(ii) Give an example for this application where privacy of data is a key concern.
...........................................................................................................................................
.......................................................................................................................................[1]
(b) Name and describe two security measures the Network Manager has in place to protect the
security of the data held in the DBMS.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(c) A task for staff at the start of the school year is to key in new pupil data from a paper document.
The data is entered to a screen form and includes the data verification of some fields.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2017 9608/12/O/N/17
5
4 The following diagram shows the components and buses found inside a typical personal computer
(PC).
C D
E
Control unit
Main memory
(a) Some components and buses only have labels A to F to identify them.
For each label, choose the appropriate title from the following list. The title for label D is
already given.
• Control bus
• Address bus
• Arithmetic Logic Unit (ALU)
• General purpose registers
• Secondary storage
• System clock
A ...........................................................................................................................................
B ...........................................................................................................................................
C ...........................................................................................................................................
D Data bus
E ...........................................................................................................................................
F ...........................................................................................................................................
[5]
(b) Clock speed is a factor that affects the performance of a PC. Explain this statement.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) An assembly language program can contain both macros and directives.
Macro ................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Directive ............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
...........................................................................................................................................
.......................................................................................................................................[1]
(d) The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Op code Explanation
Operand
(mnemonic)
Direct addressing. Load the contents of the given address
LDD <address>
to ACC.
Relative addressing. Move to the address n locations from
LDV #n the address of the current instruction. Load the contents of
this address to ACC.
STO <address> Store the contents of ACC at the given address.
INC Increment the contents of ACC.
Output the character corresponding to the ASCII character
OUTCH
code in ACC.
Following a compare instruction, jump to <address> if the
JPE <address>
compare was True.
JMP <address> Jump to the given address.
CMP #n Compare the contents of ACC with number n.
Complete the trace table for the following assembly language program.
Label Instruction
StartProg: LDV #Offset
CMP Value
ASCII code table (selected codes only)
JPE EndProg
<Space> 2 A B Y
OUTCH
32 50 65 66 89
LDD Offset
INC
STO Offset
JMP StartProg
EndProg: END
Offset: 10
50
65
89
32
Value: 32
Trace table:
[5]
(e) The program given in part (d) is to be translated using a two-pass assembler. The program
has been copied here for you.
Label Instruction
StartProg: LDV #Offset
CMP Value
JPE EndProg
OUTCH
LDD Offset
INC
STO Offset
JMP StartProg
EndProg: END
Offset: 10
50
65
89
32
Value: 32
On the first pass, the assembly process adds entries to a symbol table.
The following symbol table shows the first five entries, part way through the first pass.
The circular labels show the order in which the assembler made the entries to the symbol
table.
Complete the symbol table. Use circular labels to show the order in which the assembler
makes the entries.
Symbol table
StartProg 1 0 2
Offset 3 UNKNOWN 4
Value 5
[6]
5 The IEEE Software Engineering Code of Ethics uses eight key principles shown in the right-hand
column of the following diagram.
Tom is employed as a tester with a software company. He is keen to become a trainee programmer.
The middle column in the diagram labels six incidents which have happened to Tom this week.
The table that follows the diagram describes each incident.
IEEE category
Public
Incident C Judgement
Incident D Management
Self
Incident Description
Tom has received some phishing emails. He reported this to the bank they were
A
supposed to have come from.
B Tom has asked his manager if they will pay for him to attend a programming course.
Tom is testing beta versions of new games software at work. He copies the software on
C
to CD-Rs and sells them to his friends.
D Tom has completed the application forms to join the Chartered Institute for IT.
Tom finds it difficult to work with one of his colleagues. His way of dealing with this has
E
been to refuse to speak with the colleague.
Tom’s manager had considered the testing of a new game was completed. Tom reported
F
to his manager that he thought there were still bugs which needed to be rectified.
(a) Draw a line on the diagram to link each of the six incidents to either ethical behaviour or
unethical behaviour. [2]
Draw a line from each incident to indicate the IEEE category it maps to. [4]
© UCLES 2017 9608/12/O/N/17 [Turn over
10
6 (a) A personal computer (PC) is extensively used for a wide range of applications, including the
three shown in the following table.
Write in the table, a suitable input device, output device, or both needed for each application.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
The client
• The client names are unique.
A visit
• The company arranges a date for a visit to gather feedback from a client.
• A visit to a client never takes more than one day.
• Over time, the client receives many visits.
Staff (Interviewers)
• One or more staff attend the visit.
• If there is more than one staff member visiting, each performs a separate interview.
Interviews
• Each interview is classified as either ‘general’ or by some specialism, for example, marketing,
customer service or sales.
• A report is produced for each interview, InterviewText.
• Each interview is conducted by a single staff member.
The client, visit, staff and interview data will be stored in a relational database.
(a) (i) Underline the primary key for each table in the following suggested table designs.
VISIT(ClientName, VisitDate)
(ii) For each of the pairs of entities, A, B and C, draw the relationship between the two
entities.
A CLIENT VISIT
B VISIT INTERVIEW
C INTERVIEW STAFF
[3]
(b) The company decides to produce a visit report, VisitReportText, for each visit made.
This text will be produced from the one or more interview texts obtained at the visit.
State how one or more of the given table designs can be changed to add this attribute.
...................................................................................................................................................
...............................................................................................................................................[1]
(c) Client ABC Holdings are now trading under the name of Albright Holdings.
(i) Write an SQL script to update this client’s record in the database.
UPDATE .............................................................................................................................
SET ....................................................................................................................................
WHERE ...............................................................................................................................
[3]
(ii) Describe why this update could cause problems with the existing data stored.
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(d) Write an SQL script to display the Staff ID of each member of staff who performed an interview
when they visited New Age Toys on 13/10/2016.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(e) At present, all interviews are performed in the UK. Many clients now operate in other countries
in Europe. The company wants to perform interviews with the client’s staff in other countries.
Not all interview staff are willing to travel outside of the UK.
State how one or more of the table designs should be revised to store this information.
...................................................................................................................................................
...............................................................................................................................................[1]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (ST/JG) 129947/3
© UCLES 2017 [Turn over
2
1 (a) Each of the following bytes represents an integer in two’s complement form.
-17
[1]
(iv) State in denary, the range of integer values that it is possible to represent in two’s
complement integers using a single byte.
(b) (i) Convert the following denary integer into Binary Coded Decimal (BCD).
653
.......................................................................................................................................[1]
(ii) A 3-digit BCD representation has been incorrectly copied. It is shown as:
0 1 0 0 1 1 1 0 0 0 1 0
State how you can recognise that this is not a valid BCD representation.
...........................................................................................................................................
.......................................................................................................................................[1]
...........................................................................................................................................
.......................................................................................................................................[1]
2 (a) The diagram shows three items of software that translate program code.
Draw one line from each context to the correct item of translation software.
Assembler
Interpreter
Compiler
...........................................................................................................................................
.......................................................................................................................................[1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
3 A Local Area Network is used by staff in a hospital to access data stored in a Database Management
System (DBMS).
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) A frequent task for staff is to key in new patient data from a paper document. The document
includes the patient’s personal ID number.
(i) The Patient ID is a seven digit number. The database designer decides to use a check
digit to verify each foreign key value that a user keys in for a Patient ID.
When a user assigns a primary key value to a Patient ID, the DBMS adds a modulus-11
check digit as an eighth digit. The DBMS uses the weightings 6, 5, 4, 3, 2 and 1 for
calculating the check digit. It uses 6 as the multiplier for the most significant (leftmost)
digit.
Show the calculation of the check digit for the Patient ID with the first six digits 786531.
(ii) Name and describe two validation checks that the DBMS could carry out on each
primary key value that a user keys in for a Patient ID.
Description .................................................................................................................
....................................................................................................................................
Description .................................................................................................................
....................................................................................................................................
[4]
4 (a) The diagram shows the components and buses found inside a typical Personal Computer
(PC).
General purpose
registers
D
Arithmetic Logic
E F
Unit (ALU)
For each label, choose the appropriate title from the following list. The title for label D is
already given.
• Control bus
• System clock
• Data bus
• Control unit
• Main memory
• Secondary storage
A ...........................................................................................................................................
B ...........................................................................................................................................
C ...........................................................................................................................................
D Address bus
E ...........................................................................................................................................
F ...........................................................................................................................................
[5]
(b) The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Op code Op code Explanation
Operand
(mnemonic) (binary)
LDM #n 1100 0001 Immediate addressing. Load number n to ACC.
Direct addressing. Load the contents of the given
LDD <address> 1100 0010
address to ACC.
Relative addressing. Move to the address n locations
LDV #n 1100 0011 from the address of the current instruction. Load the
contents of this address to ACC.
STO <address> 1100 0100 Store the contents of ACC at the given address.
DEC 1100 0101 Decrement the contents of ACC.
Output the character corresponding to the ASCII
OUTCH 1100 0111
character code in ACC.
Following a compare instruction, jump to <address> if
JNE <address> 1110 0110
the compare was False.
JMP <address> 1110 0011 (Unconditionally) jump to the given address.
CMP #n 1110 0100 Compare the contents of ACC with number n.
Complete the trace table for the following assembly language program.
Label Instruction
StartProg: LDV #CountDown
CMP Num1
ASCII code table (selected codes only)
JNE CarryOn
<Space> 3 B C X
JMP Finish
32 51 66 67 88
CarryOn: OUTCH
LDD CountDown
DEC
STO CountDown
JMP StartProg
Finish: LDM #88
OUTCH
END
CountDown: 15
32
51
67
Num1: 32
Trace table:
[5]
(c) The program given in part (b) is to be translated using a two-pass assembler.
The program has been copied here for you. The program now starts with a directive which
tells the assembler to load the first instruction of the program to address 100.
Label
ORG #0100
StartProg: LDV #CountDown
CMP Num1
JNE CarryOn
JMP Finish
CarryOn: OUTCH
LDD CountDown
DEC
STO CountDown
JMP StartProg
Finish: LDM #88
OUTCH
END
CountDown: 15
32
51
67
Num1: 32
On the first pass of the two-pass process, the assembler adds entries to a symbol table.
The following symbol table shows the first eleven entries, part way through the first pass.
The circular labels show the order in which the assembler made the entries to the symbol
table.
Symbol table
StartProg 1 100 2
CountDown 3 UNKNOWN 4
Num1 5 UNKNOWN 6
Finish 9 UNKNOWN 10
Explain how the assembler made these entries to the symbol table.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(d) The assembler software must then complete the second pass building up the executable file.
(i) Name the second table needed when the assembler software carries out the second
pass.
.......................................................................................................................................[1]
Machine code
Instruction Binary Hexadecimal
OUTCH 1100 0111 C7
JNE CarryOn A B
Each of the numbers A and B represents the complete instruction in two bytes, one byte for
the op code and one byte for the operand.
(ii) Use the following instruction set to write the numbers for A and B.
A (binary) ........................................................................................................................
B (hexadecimal) .............................................................................................................
[3]
Instruction
Op code Op code Explanation
Operand
(mnemonic) (binary)
LDM #n 1100 0001 Immediate addressing. Load number n to ACC.
Direct addressing. Load the contents of the given
LDD <address> 1100 0010
address to ACC.
Relative addressing. Move to the address n locations
LDV #n 1100 0011 from the address of the current instruction. Load the
contents of this address to ACC.
STO <address> 1100 0100 Store the contents of ACC at the given address.
DEC 1100 0101 Decrement the contents of ACC.
Output the character corresponding to the ASCII
OUTCH 1100 0111
character code in ACC.
Following a compare instruction, jump to <address> if
JNE <address> 1110 0110
the compare was False.
JMP <address> 1110 0011 (Unconditionally) jump to the given address.
CMP #n 1110 0100 Compare the contents of ACC with number n.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
(b) (i) The user is considering the purchase of a removable device for secondary storage.
.......................................................................................................................................[1]
(ii) Describe two possible uses for this device on a home Personal Computer (PC).
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
6 Raj has joined a software company as a trainee programmer. He was given the company’s Code
of Conduct document during his induction training. The handbook has a section headed ‘Ethical
Behaviour’.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
In his first week, Raj feels uncomfortable working with one of his colleagues. He is unfamiliar
with the programming language used by the team. Next week, he will be working on the site
of one of the company’s clients with a colleague. Raj is very nervous about working in an
unfamiliar workplace.
Raj has a review with his manager after his first three weeks.
The Code of Conduct document was produced by the Human Resources section. It closely
follows the ACM/IEEE Software Engineering Code of Ethics that uses these eight key
principles:
There are issues Raj will want to raise with his manager.
Issue 1
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Issue 2
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
7 A clinic is staffed by several doctors. The clinic serves thousands of patients. Each day and at any
one time, there is only one doctor in the clinic available for appointments.
The clinic stores patient, doctor and appointment data in a relational database.
(a) (i) Underline the primary key for each table in the following suggested table designs.
(ii) Complete the following entity-relationship (E-R) diagram for this design.
[2]
(b) The doctors are concerned that many patients make appointments but do not attend them.
Describe the changes to the table designs that could be made to store this information.
...................................................................................................................................................
...............................................................................................................................................[2]
(c) The doctors are about to set up a new clinic in the neighbouring village, SITE-B.
A new table is designed to store the ID of the doctor who is able to work at each site.
DOCTOR-AVAILABILITY(DoctorID, Site)
DoctorID Site
098 SITE-A
074 SITE-A
117 SITE-B
098 SITE-B
033 SITE-B
(i) State what this data shows about the availability of the doctor with the ID of 098.
...........................................................................................................................................
.......................................................................................................................................[1]
(ii) Opening a new clinic in the neighbouring village will not require any additional table for
storing appointments. It will need a change to the existing appointment table design.
APPOINTMENT( ................................................................................................................
................................................................................................................................... ) [1]
(d) The doctor with the ID of 117 has recently been allocated a new DoctorID of 017.
(i) Write an SQL script to update this doctor’s record in the database.
UPDATE .............................................................................................................................
SET .....................................................................................................................................
WHERE ...............................................................................................................................
[3]
(ii) Describe why this update could cause problems with the existing data stored.
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(e) Write an SQL script to display the date and time of all appointments made by the patient with
the PatientID of 556.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SR/FC) 146091
© UCLES 2017 [Turn over
2
1 A hospital is divided into two areas, Area A and Area B. Each area has several wards. All the ward
names are different.
A number of nurses are based in Area A. These nurses always work on the same ward. Each
nurse has a unique Nurse ID of STRING data type.
A-NURSE A-WARD
...................................................................................................................................................
...............................................................................................................................................[1]
(b) A relational database is created to store the ward and nurse data. The two table designs for
Area A are:
A-WARD(WardName, NumberOfBeds)
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(c) In Area B of the hospital, there are a number of wards and a number of nurses.
A nurse can be asked to work in any of the Area B wards where their specialism matches with
the ward specialism.
B-NURSE B-WARD
(i) Explain what the degree of relationship is between the entities B-NURSE and B-WARD.
...........................................................................................................................................
.......................................................................................................................................[1]
B-WARD-NURSE( ............................................................................................................ )
Complete the attributes for the third table. Underline its primary key. [2]
B-NURSE B-WARD
B-WARD-NURSE
[2]
(i) Write an SQL query to display the Nurse ID and family name for all Area B nurses with a
specialism of ‘THEATRE’.
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
(ii) Fatima Woo is an Area B nurse with the nurse ID of 076. She has recently married, and
her new family name is Chi.
UPDATE .............................................................................................................................
SET ....................................................................................................................................
WHERE ...............................................................................................................................
[3]
2 (a) (i) The following sequence of steps (1 to 7) describe how a single page is printed on a laser
printer.
The paper passes through a fuser, which heats up the paper. The toner melts and
A
forms a permanent image on the paper.
B The electrical charge is removed from the drum and the excess toner is collected.
The oppositely-charged paper picks up the toner particles from the drum. After
D
picking up the toner, the paper is discharged to stop it clinging to the drum.
Complete the sequence by writing one of the letters A, B, C or D on the appropriate row.
1. A laser beam and a rotating mirror are used to draw an image of the page on the
photosensitive drum.
2. .........................
5. .........................
6. .........................
7. ......................... [3]
(ii) A computer user has a laser printer to print letters and documents. The user also prints
digital photographs taken using a digital camera.
State the most suitable type of printer for printing the photographs.
.......................................................................................................................................[1]
(b) The user is considering the purchase of a new laptop computer. She has read many product
reviews and knows that there are different types of internal secondary storage available.
Option 1 ....................................................................................................................................
Option 2 ....................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2017 9608/13/M/J/17
5
3 (a) A computer has a microphone and captures a voice recording using sound recording software.
Before making a recording, the user can select the sampling rate.
Define the term sampling rate. Explain how the sampling rate will influence the accuracy of
the digitised sound.
...................................................................................................................................................
...................................................................................................................................................
Explanation ...............................................................................................................................
...................................................................................................................................................
[2]
Pixel ...................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(ii) A picture has been drawn and is saved as a monochrome bitmap image.
.......................................................................................................................................[1]
(iii) A second picture has width 2048 pixels and height 512 pixels. It is saved as a 256-colour
image.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
(iv) The actual bitmap file size will be larger than your calculated value.
State another data item that the bitmap file stores in addition to the pixel data.
...........................................................................................................................................
.......................................................................................................................................[1]
4 The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC) and an Index Register (IX).
Instruction
Op code Op code Explanation
Operand
(mnemonic) (binary)
Immediate addressing. Load the denary number n to
LDM #n 0000 0001
ACC.
Direct addressing. Load the contents of the location
LDD <address> 0000 0010
at the given address to ACC.
Indirect addressing. At the given address is the
LDI <address> 0000 0101 address to be used. Load the contents of this second
address to ACC.
Indexed addressing. Form the address from
<address> + the contents of the Index Register
LDX <address> 0000 0110
(IX). Copy the contents of this calculated address to
ACC.
LDR #n 0000 0111 Immediate addressing. Load number n to IX.
STO <address> 0000 1111 Store the contents of ACC at the given address.
The following diagram shows the contents of a section of main memory and the Index Register (IX).
(a) Show the contents of the Accumulator (ACC) after each instruction is executed.
IX 0 0 0 0 0 0 1 1
Main
(i) LDM #500
Memory
Address contents
ACC ................................................................[1]
495 13
(ii) LDD 500
496 86
ACC ................................................................[1] 497 92
(b) Each machine code instruction is encoded as 16-bits (8-bit op code followed by an 8-bit
operand).
LDM #17
LDX #97
[3]
(c) Using an 8-bit operand, state the maximum number of memory locations, in denary, that can
be directly addressed.
...............................................................................................................................................[1]
0 0 0 0 0 1 1 1 1 1 0 0 0 0 1 0
.......................................................................................................................................[2]
05 3F
Write the equivalent assembly language instruction, with the operand in denary.
.......................................................................................................................................[2]
5 A computer receives data from a remote data logger. Each data block is a group of 8 bytes.
A block is made up of seven data bytes and a parity byte.
Each data byte has a parity bit using odd parity. The parity byte also uses odd parity.
The following table shows a data block before transmission. Bit position 0 is the parity bit.
Bit position
7 6 5 4 3 2 1 0
1 1 0 0 1 1 0 1
0 0 1 0 0 0 0 0
1 0 0 1 1 1 0 A
1 1 0 0 0 0 1 0 Data bytes
1 1 0 0 0 0 1 0
1 1 0 0 0 1 1 B
0 0 0 0 0 0 0 0
0 1 1 0 1 1 0 0 Parity byte
(a) (i) Describe how the data logger calculates the parity bit for each of the bytes in the data
block.
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
A = ..............................
B = .............................. [1]
(iii) Describe how the computer uses the parity byte to perform a further check on the
received data bytes.
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(b) (i) A second data block is received as shown in the following table. There are errors in this
data block.
Identify and then circle two bits in the table which must be changed to remove the errors.
Bit position
7 6 5 4 3 2 1 0
1 0 0 0 1 1 0 0
0 0 1 0 0 0 0 0
0 0 1 1 0 1 0 1
1 1 1 1 0 0 0 1
1 1 0 0 0 0 1 0
0 0 1 0 0 1 0 0
0 0 0 0 0 0 0 1
0 1 0 1 1 0 0 0
[2]
(ii) Explain how you arrived at your answers for part (b)(i).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
6 (a) The operating system (OS) contains code for performing various management tasks.
The appropriate code is run when the user performs various actions.
Draw a line to link each OS management task to the appropriate user action.
(b) A user has the following issues with the use of his PC.
(i) The hard disk stores a large number of video files. The computer frequently runs out of
storage space.
(ii) The user is unable to find an important document. He thinks it was deleted in error some
weeks ago. This must not happen again.
(iv) There have been some unexplained images and advertisements appearing on the
screen. The user suspects it is malware.
7 The design of a web-based application can require the use of client-side scripting.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) A user requests a web page by keying the Uniform Resource Locator (URL) into the address
bar of their web browser.
Describe the sequence of steps leading to the display of the web page on the computer
screen.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
1 <html>
2 <head>
3 <title>Untitled Document</title>
4 <script language="JavaScript">
5
6 function myButton_onmousedown()
7 {
8 var Message1 = "ERROR – Order refused";
9 var Message2 = "Product code OK";
10 var x = document.forms["form1"]["txtProductCode"].value;
11 if (x == "")
12 {
13 alert(Message1)
14 }
15 else
16 {
17 alert(Message2)
18 }
19 }
20 </script>
21
22 </head>
23 <body>
24 <form name = form1>
25 <label>Product code: </label>
26 <input type="text" name="txtProductCode" >
27 <label>Number: </label>
28 <input type="text" name="txtNumber" size = "5" >
29 <p>
30 <label>Submit order: </label>
31 <input type="button" name="btnSubmit" Value = "Submit"
32
33 onMouseDown = "myButton_onmousedown()" >
34 </p>
35 </form>
36
37 </body>
38 </html>
(i) The developer has used three variables in the JavaScript code. State the identifiers used.
1 ..................................................................
2 ..................................................................
3 .................................................................. [2]
(ii) The button has an event whose identifier is onMouseDown. When the submit button is
clicked, some code is executed.
(iv) Describe the purpose of the validation check that the code performs.
...........................................................................................................................................
.......................................................................................................................................[1]
(v) Name and describe two other types of validation check that could be appropriate for this
data capture form.
Description ........................................................................................................................
...........................................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
[4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (CE/FC) 129908/3
© UCLES 2017 [Turn over
2
1 Some shops belong to the Rainbow Retail buying group. They buy their goods from one or more
suppliers.
• a unique shop ID
• a single retail specialism (for example, food, electrical, garden).
• a unique supplier ID
• a similar single specialism recorded.
Rainbow Retail creates a relational database to record data about the shops and their suppliers.
The entity-relationship (E-R) diagram for the relationship between the SHOP and SUPPLIER tables
is shown.
SHOP SUPPLIER
(a) Explain what the degree of relationship is between the entities SHOP and SUPPLIER.
...................................................................................................................................................
...............................................................................................................................................[1]
SHOP-SUPPLIER(ShopID, SupplierID)
The SHOP–SUPPLIER table stores the suppliers that each shop has previously used.
(b) (i) Label the entities and draw the relationships to complete the revised E-R diagram.
SUPPLIER
[3]
(ii) Complete the following table to show for each database table:
SHOP
SUPPLIER
SHOP–SUPPLIER
[5]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(c) (i) Write an SQL query to display the shop ID and location of all shops with a ‘GROCERY’
specialism.
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
(ii) The existing shop with ID 8765 has just used the existing supplier SUP89 for the first
time.
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
2 (a) The first column of the following table gives features of different types of printer.
Put a tick (3) in the cells to show which features describe a laser and an inkjet printer.
Type of printer
Laser Inkjet
Impact printer
Non-impact printer
Line printer
Page printer
[2]
(b) Two of the components of an inkjet printer are a stepper motor and a print head.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[5]
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(c) A student has an old working laptop computer. It has a small capacity internal disk drive with
almost all the storage space taken up by the operating system and application programs.
She needs to buy an external storage device to store her data files.
Device 1 ............................................................................................................................
Device 2 ............................................................................................................................
[2]
...........................................................................................................................................
.......................................................................................................................................[1]
3 (a) A computer has a microphone and captures a voice recording using sound editing software.
The user can select the sampling resolution before making a recording.
Define the term sampling resolution. Explain how the sampling resolution will affect the
accuracy of the digitised sound.
...................................................................................................................................................
...................................................................................................................................................
Explanation ...............................................................................................................................
...................................................................................................................................................
[3]
...........................................................................................................................................
.......................................................................................................................................[1]
State how many bits are used to encode the data for one pixel.
.......................................................................................................................................[1]
(iii) A second picture has width 8192 pixels and height 256 pixels. It is saved as a 256-colour
bitmap.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
(iv) The actual bitmap file size will be larger than your calculated value as a bitmap file has a
file header.
State two items of data that are stored in the file header.
1 ........................................................................................................................................
2 ....................................................................................................................................[2]
© UCLES 2017 9608/12/M/J/17
7
4 (a) (i) Explain why a personal computer (PC) needs an operating system (OS).
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) One of the tasks carried out by the OS is the management of the use of the processor.
Name and describe two other management tasks that the OS performs.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(b) A user has the following issues with the use of their personal computer (PC).
For each case, state the utility software which should provide a solution.
(i) The user wants to send a large file as an attachment to an email. The user knows that
the recipient’s Internet Service Provider (ISP) has a limit of 2MB for file attachments.
(ii) The user is writing a book and is worried that the document files could get damaged or
deleted.
(iii) The computer has recently been slow to load large files. The user has deleted a large
number of small files to try to solve the problem. A friend has advised that there is a
procedure which should be regularly carried out to reorganise file storage on the hard
disk.
(iv) The user clicked on an attachment in an unsolicited email. Since then, the computer has
shown some unexplained behaviours.
5 The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Op code Op code Explanation
Operand
(mnemonic) (binary)
Direct addressing. Load the contents of
LDD <address> 0001 0011 the location at the given address to the
Accumulator (ACC).
Indirect addressing. The address to be used is
LDI <address> 0001 0100 at the given address. Load the contents of this
second address to ACC.
Indexed addressing. Form the address from
<address> + the contents of the Index
LDX <address> 0001 0101
Register. Copy the contents of this calculated
address to ACC.
Immediate addressing. Load the denary
LDM #n 0001 0010
number n to ACC.
Immediate addressing. Load denary number n
LDR #n 0001 0110
to the Index Register (IX).
Store the contents of ACC at the given
STO <address> 0000 0111
address.
The following diagram shows the contents of a section of main memory and the Index Register (IX).
(a) Show the contents of the Accumulator (ACC) after each instruction is executed.
IX 0 0 0 0 0 1 1 0
(b) Each machine code instruction is encoded as 16 bits (8-bit op code followed by an 8-bit
operand).
LDM #67
LDX #7
[3]
0 0 0 1 0 1 0 0 0 1 0 1 1 1 1 0
.......................................................................................................................................[2]
16 4D
Write the assembly language for this instruction with the operand in denary.
.......................................................................................................................................[2]
(a) Describe what is meant by the term client-server for this application.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) The following sequence of steps (1 to 5) describes what happens when someone uses their
personal computer (PC) to request a web page. The web page consists of HTML tags and
text content only. Four of the statements from A, B, C, D, E and F are used to complete the
sequence.
A Browser software interprets the script, renders the page and displays.
B Browser software renders the page and displays.
C Browser software compiles the script, renders the page and displays.
D The web server retrieves the page.
E The Domain Name Service (DNS) uses the domain name from the
browser to look up the IP address of the web server.
F The web server sends the web page content to the browser.
Write one of the letters A to F in the appropriate row to complete the sequence.
1. The user keys in the Uniform Resource Locator (URL) into the browser software.
2. ....................................
3. ....................................
4. ....................................
5. ....................................
[4]
(c) The following web page used for data capture consists of:
1 <html>
2 <head>
3 <title>Untitled Document</title>
4 <script language="JavaScript">
5
6 function myButton_onmousedown()
7 {
8 var Output1 = "Runner ID OK";
9 var Output2 = "ERROR – entry refused";
10
11 var Runner ID = document.forms["form1"]["txtRunnerID"].value;
12 // || in Javascript is the 'OR' operator
13 if (RunnerID.substr(0,3) == "VAR" || RunnerID.substr(0,3) == "CAM")
14 {
15 alert(Output1)
16 }
17 else
18 {
19 alert(Output2)
20 }
21 }
22 </script>
23
24 </head>
25 <body>
26 <form name = form1>
27 <label>Runner ID: </label>
28 <input type="text" name="txtRunnerID" >
29 <label>Position: </label>
30 <input type="text" name="txtPosition" size = "5" >
31 <p>
32 <label>Save data: </label>
33 <input type="button" name="btnSubmit" Value = "Submit"
34
35 onMouseDown = "myButton_onmousedown()" >
36 </p>
37 </form>
38
39 </body>
40 </html>
(i) The developer has used three variables in the JavaScript code. State the identifiers
used.
1. ....................................
2. ....................................
3. .................................... [2]
(ii) The button has an event whose identifier is onMouseDown. When the mouse button is
clicked, some code is run.
(iv) Describe the purpose of the validation check that the code performs.
...........................................................................................................................................
.......................................................................................................................................[1]
(v) Name and describe two other types of validation check which could be appropriate for
this data capture form.
Description ........................................................................................................................
...........................................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
[4]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NH/FC) 129906/4
© UCLES 2017 [Turn over
2
1 A hospital is divided into two areas, Area A and Area B. Each area has several wards. All the ward
names are different.
A number of nurses are based in Area A. These nurses always work on the same ward. Each
nurse has a unique Nurse ID of STRING data type.
A-NURSE A-WARD
...................................................................................................................................................
...............................................................................................................................................[1]
(b) A relational database is created to store the ward and nurse data. The two table designs for
Area A are:
A-WARD(WardName, NumberOfBeds)
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(c) In Area B of the hospital, there are a number of wards and a number of nurses.
A nurse can be asked to work in any of the Area B wards where their specialism matches with
the ward specialism.
B-NURSE B-WARD
(i) Explain what the degree of relationship is between the entities B-NURSE and B-WARD.
...........................................................................................................................................
.......................................................................................................................................[1]
B-WARD-NURSE( ............................................................................................................ )
Complete the attributes for the third table. Underline its primary key. [2]
B-NURSE B-WARD
B-WARD-NURSE
[2]
(i) Write an SQL query to display the Nurse ID and family name for all Area B nurses with a
specialism of ‘THEATRE’.
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
(ii) Fatima Woo is an Area B nurse with the nurse ID of 076. She has recently married, and
her new family name is Chi.
UPDATE .............................................................................................................................
SET ....................................................................................................................................
WHERE ...............................................................................................................................
[3]
2 (a) (i) The following sequence of steps (1 to 7) describe how a single page is printed on a laser
printer.
The paper passes through a fuser, which heats up the paper. The toner melts and
A
forms a permanent image on the paper.
B The electrical charge is removed from the drum and the excess toner is collected.
The oppositely-charged paper picks up the toner particles from the drum. After
D
picking up the toner, the paper is discharged to stop it clinging to the drum.
Complete the sequence by writing one of the letters A, B, C or D on the appropriate row.
1. A laser beam and a rotating mirror are used to draw an image of the page on the
photosensitive drum.
2. .........................
5. .........................
6. .........................
7. ......................... [3]
(ii) A computer user has a laser printer to print letters and documents. The user also prints
digital photographs taken using a digital camera.
State the most suitable type of printer for printing the photographs.
.......................................................................................................................................[1]
(b) The user is considering the purchase of a new laptop computer. She has read many product
reviews and knows that there are different types of internal secondary storage available.
Option 1 ....................................................................................................................................
Option 2 ....................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2017 9608/11/M/J/17
5
3 (a) A computer has a microphone and captures a voice recording using sound recording software.
Before making a recording, the user can select the sampling rate.
Define the term sampling rate. Explain how the sampling rate will influence the accuracy of
the digitised sound.
...................................................................................................................................................
...................................................................................................................................................
Explanation ...............................................................................................................................
...................................................................................................................................................
[2]
Pixel ...................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(ii) A picture has been drawn and is saved as a monochrome bitmap image.
.......................................................................................................................................[1]
(iii) A second picture has width 2048 pixels and height 512 pixels. It is saved as a 256-colour
image.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
(iv) The actual bitmap file size will be larger than your calculated value.
State another data item that the bitmap file stores in addition to the pixel data.
...........................................................................................................................................
.......................................................................................................................................[1]
4 The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC) and an Index Register (IX).
Instruction
Op code Op code Explanation
Operand
(mnemonic) (binary)
Immediate addressing. Load the denary number n to
LDM #n 0000 0001
ACC.
Direct addressing. Load the contents of the location
LDD <address> 0000 0010
at the given address to ACC.
Indirect addressing. At the given address is the
LDI <address> 0000 0101 address to be used. Load the contents of this second
address to ACC.
Indexed addressing. Form the address from
<address> + the contents of the Index Register
LDX <address> 0000 0110
(IX). Copy the contents of this calculated address to
ACC.
LDR #n 0000 0111 Immediate addressing. Load number n to IX.
STO <address> 0000 1111 Store the contents of ACC at the given address.
The following diagram shows the contents of a section of main memory and the Index Register (IX).
(a) Show the contents of the Accumulator (ACC) after each instruction is executed.
IX 0 0 0 0 0 0 1 1
Main
(i) LDM #500
Memory
Address contents
ACC ................................................................[1]
495 13
(ii) LDD 500
496 86
ACC ................................................................[1] 497 92
(b) Each machine code instruction is encoded as 16-bits (8-bit op code followed by an 8-bit
operand).
LDM #17
LDX #97
[3]
(c) Using an 8-bit operand, state the maximum number of memory locations, in denary, that can
be directly addressed.
...............................................................................................................................................[1]
0 0 0 0 0 1 1 1 1 1 0 0 0 0 1 0
.......................................................................................................................................[2]
05 3F
Write the equivalent assembly language instruction, with the operand in denary.
.......................................................................................................................................[2]
5 A computer receives data from a remote data logger. Each data block is a group of 8 bytes.
A block is made up of seven data bytes and a parity byte.
Each data byte has a parity bit using odd parity. The parity byte also uses odd parity.
The following table shows a data block before transmission. Bit position 0 is the parity bit.
Bit position
7 6 5 4 3 2 1 0
1 1 0 0 1 1 0 1
0 0 1 0 0 0 0 0
1 0 0 1 1 1 0 A
1 1 0 0 0 0 1 0 Data bytes
1 1 0 0 0 0 1 0
1 1 0 0 0 1 1 B
0 0 0 0 0 0 0 0
0 1 1 0 1 1 0 0 Parity byte
(a) (i) Describe how the data logger calculates the parity bit for each of the bytes in the data
block.
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
A = ..............................
B = .............................. [1]
(iii) Describe how the computer uses the parity byte to perform a further check on the
received data bytes.
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(b) (i) A second data block is received as shown in the following table. There are errors in this
data block.
Identify and then circle two bits in the table which must be changed to remove the errors.
Bit position
7 6 5 4 3 2 1 0
1 0 0 0 1 1 0 0
0 0 1 0 0 0 0 0
0 0 1 1 0 1 0 1
1 1 1 1 0 0 0 1
1 1 0 0 0 0 1 0
0 0 1 0 0 1 0 0
0 0 0 0 0 0 0 1
0 1 0 1 1 0 0 0
[2]
(ii) Explain how you arrived at your answers for part (b)(i).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
6 (a) The operating system (OS) contains code for performing various management tasks.
The appropriate code is run when the user performs various actions.
Draw a line to link each OS management task to the appropriate user action.
(b) A user has the following issues with the use of his PC.
(i) The hard disk stores a large number of video files. The computer frequently runs out of
storage space.
(ii) The user is unable to find an important document. He thinks it was deleted in error some
weeks ago. This must not happen again.
(iv) There have been some unexplained images and advertisements appearing on the
screen. The user suspects it is malware.
7 The design of a web-based application can require the use of client-side scripting.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) A user requests a web page by keying the Uniform Resource Locator (URL) into the address
bar of their web browser.
Describe the sequence of steps leading to the display of the web page on the computer
screen.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
1 <html>
2 <head>
3 <title>Untitled Document</title>
4 <script language="JavaScript">
5
6 function myButton_onmousedown()
7 {
8 var Message1 = "ERROR – Order refused";
9 var Message2 = "Product code OK";
10 var x = document.forms["form1"]["txtProductCode"].value;
11 if (x == "")
12 {
13 alert(Message1)
14 }
15 else
16 {
17 alert(Message2)
18 }
19 }
20 </script>
21
22 </head>
23 <body>
24 <form name = form1>
25 <label>Product code: </label>
26 <input type="text" name="txtProductCode" >
27 <label>Number: </label>
28 <input type="text" name="txtNumber" size = "5" >
29 <p>
30 <label>Submit order: </label>
31 <input type="button" name="btnSubmit" Value = "Submit"
32
33 onMouseDown = "myButton_onmousedown()" >
34 </p>
35 </form>
36
37 </body>
38 </html>
(i) The developer has used three variables in the JavaScript code. State the identifiers used.
1 ..................................................................
2 ..................................................................
3 .................................................................. [2]
(ii) The button has an event whose identifier is onMouseDown. When the submit button is
clicked, some code is executed.
(iv) Describe the purpose of the validation check that the code performs.
...........................................................................................................................................
.......................................................................................................................................[1]
(v) Name and describe two other types of validation check that could be appropriate for this
data capture form.
Description ........................................................................................................................
...........................................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
[4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (KN/SG) 128900
© UCLES 2016 [Turn over
2
1 (a) Five descriptions and seven relational database terms are shown below.
Candidate key
Dataset organised in rows and columns;
the columns form the structure and the
rows form the content
Entity
Primary key
Attribute(s) in a table that link to the
primary key in another table to form a
relationship Table
Tuple
Attribute or combination of attributes that
is used to uniquely identify a record
[5]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
2 (a) State two differences between Static RAM (SRAM) and Dynamic RAM (DRAM).
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Give two key management tasks carried out by an operating system.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
.......................................................................................................................................[2]
(c) New program code is to be written in a high-level language. The use of Dynamic Link Library
(DLL) files is considered in the design.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...........................................................................................................................................
.......................................................................................................................................[1]
...........................................................................................................................................
.......................................................................................................................................[1]
...........................................................................................................................................
.......................................................................................................................................[1]
(i) Describe how denary integers larger than 9 can be converted into BCD.
Give an example in your answer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Describe how an 8-bit BCD representation can be converted into a denary integer.
Give an example in your answer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(i) Keyboard
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(iv) Scanner
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
5 A motor is controlled by a logic circuit. The circuit has inputs (0 or 1) from three sensors
R, T and W. The motor is switched off when the output from the logic circuit is 1.
The following table shows the three sensors and the conditions being monitored.
0 temperature >= 90 °C
T temperature
1 temperature < 90 °C
or
T X
[5]
(ii) Give a logic statement corresponding to the logic circuit in part (i).
...........................................................................................................................................
.......................................................................................................................................[2]
R T W X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
6 A user watches a video available on a website. The website uses on-demand bit streaming.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
7 A small company produces scientific magazines. The owner buys some new desktop computers.
The computers are used to store thousands of colour images (diagrams and photographs). All the
computers have Internet access.
(a) Name three utility programs the company would use on all their computers. Describe what
each program does.
1 ................................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
Description ................................................................................................................................
...............................................................................................................................................[6]
(b) The images contained in the magazines are produced using either bitmap or vector graphics
software.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...............................................................................................................................................[4]
(c) Employees using the new computers receive training. At the end of the training, each
employee completes a series of questions.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) “Data validation is used to make sure that data keyed in are the same as the original data
supplied.”
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(iii) “The use of passwords will always prevent unauthorised access to the data stored on the
computers.”
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
8 The table shows assembly language instructions for a processor which has one general purpose
register, the Accumulator (ACC) and an Index Register (IX).
Instruction
Explanation
Op code Operand
LDD <address> Direct addressing. Load the contents of the given address to ACC.
Indexed addressing. Form the address from <address> + the
LDX <address> contents of the index register. Copy the contents of this calculated
address to ACC.
STO <address> Store contents of ACC at the given address.
ADD <address> Add the contents of the given address to ACC.
CMP <address> Compare contents of ACC with contents of <address>
Following a compare instruction, jump to <address> if the compare
JPE <address>
was True.
Following a compare instruction, jump to <address> if the compare
JPN <address>
was False.
JMP <address> Jump to the given address.
Output to the screen the character whose ASCII value is stored in
OUT
ACC.
END Return control to the operating system.
Main memory
800 0110 0100
801 0111 1100
802 1001 0111
803 0111 0011
804 1001 0000
805 0011 1111
806 0000 1110
807 1110 1000
808 1000 1110
809 1100 0010
:
:
2000 1011 0101
(a) (i) Show the contents of the Accumulator after execution of the instruction:
LDD 802
Accumulator:
[1]
(ii) Show the contents of the Accumulator after execution of the instruction:
LDX 800
Index Register: 0 0 0 0 1 0 0 1
Accumulator:
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
(b) (i) Complete the trace table below for the following assembly language program. This
program contains denary values.
Trace table:
Memory address
ACC OUTPUT
800 801 802 803
40 50 0 90
[4]
.......................................................................................................................................[1]
(c) The program used the ASCII coding system for character codes. An alternative coding system
is Unicode.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (KN) 122134/3
© UCLES 2016 [Turn over
2
S X
[6]
(b) Complete the truth table for the logic expression given in part (a).
B S P Working space X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
...................................................................................................................................................
...............................................................................................................................................[1]
(b) Video streaming can use either interlaced encoding or progressive encoding.
Interlaced encoding
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Progressive encoding
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
Description Term
[2]
(ii) Give one file technique that could be applied when either of the two features, described
in part (c)(i), are present.
...........................................................................................................................................
.......................................................................................................................................[1]
3 When an application program requests a file stored on a hard disk, the computer system reads
the file. Use the statement labels A to H to complete the sequence of steps that describe how this
happens.
Label Statement
A When the hard disk drive has read the file, it generates an interrupt.
The operating system transfers the contents of the disk buffer to the
E
application program’s data memory.
In the relevant directory file, the operating system looks up the track
F
and sector where the file begins.
Application program passes file read request to the operating
G
system.
The hard disk drive waits for the correct sector to arrive under the
H
head.
2. ............................
3. The operating system begins to spin the hard disk, if it is not currently spinning.
4. ............................
5. ............................
6. ............................
7. ............................
8. ............................
9. ............................
10. ............................
[8]
4 Hexadecimal, Binary Coded Decimal (BCD) and binary values are shown below.
93
Hexadecimal:
3A
–65
BCD representation: 58
0100 1001
–63
Binary integer:
01011101
73
Two’s complement
binary integer: 49
11000001
–93
[4]
5 The table shows assembly language instructions for a processor that has one general purpose
register, the Accumulator (ACC) and an index register (IX).
Instruction
Explanation
Op Code Operand
Direct addressing. Load the contents of the given address to
LDD <address>
ACC.
Index addressing. Form the address from <address> +
LDX <address> the contents of the index register. Copy the contents of this
calculated address to ACC.
Indirect addressing. The address to be used is at the given
LDI <address>
address. Load the contents of this second address to ACC.
ADD <address> Add the contents of the given address to the ACC.
Main memory
(a) (i) Show the contents of the Accumulator after the execution of the instruction:
LDD 102
ACC:
[1]
(ii) Show the contents of the Accumulator after the execution of the instruction:
LDX 101
IX: 0 0 0 0 0 1 0 0
ACC:
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(iii) Show the contents of the Accumulator after the execution of the instruction:
LDI 103
ACC:
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
(b) Complete the trace table below for the following assembly language program.
806 END
810 28
811 41
812 0
813 0
Trace table:
Memory address
ACC
810 811 812 813
28 41 0 0
[6]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
(b) State three differences between Dynamic RAM (DRAM) and Static RAM (SRAM).
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...............................................................................................................................................[3]
7 One management task carried out by an operating system is to provide a user interface.
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
(a) Describe two benefits to the programmer of using one or more library routines.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) The programmer decides to use a Dynamic Link Library (DLL) file.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
9 A health club offers classes to its members. A member needs to book into each class in advance.
(a) The health club employs a programmer to update the class booking system. The programmer
has to decide how to store the records. The choice is between using a relational database or
a file-based approach.
Give three reasons why the programmer should use a relational database.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
(b) The programmer decides to use three tables: MEMBER, BOOKING and CLASS.
Complete the Entity-Relationship (E-R) diagram to show the relationships between these
tables.
MEMBER CLASS
BOOKING
[2]
(c) The CLASS table has primary key ClassID and stores the following data:
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (ST/SG) 115872/3
© UCLES 2016 [Turn over
2
1 (a) Five descriptions and seven relational database terms are shown below.
Candidate key
Dataset organised in rows and columns;
the columns form the structure and the
rows form the content
Entity
Primary key
Attribute(s) in a table that link to the
primary key in another table to form a
relationship Table
Tuple
Attribute or combination of attributes that
is used to uniquely identify a record
[5]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
2 (a) State two differences between Static RAM (SRAM) and Dynamic RAM (DRAM).
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Give two key management tasks carried out by an operating system.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
.......................................................................................................................................[2]
(c) New program code is to be written in a high-level language. The use of Dynamic Link Library
(DLL) files is considered in the design.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...........................................................................................................................................
.......................................................................................................................................[1]
...........................................................................................................................................
.......................................................................................................................................[1]
...........................................................................................................................................
.......................................................................................................................................[1]
(i) Describe how denary integers larger than 9 can be converted into BCD.
Give an example in your answer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Describe how an 8-bit BCD representation can be converted into a denary integer.
Give an example in your answer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(i) Keyboard
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(iv) Scanner
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
5 A motor is controlled by a logic circuit. The circuit has inputs (0 or 1) from three sensors
R, T and W. The motor is switched off when the output from the logic circuit is 1.
The following table shows the three sensors and the conditions being monitored.
0 temperature >= 90 °C
T temperature
1 temperature < 90 °C
or
T X
[5]
(ii) Give a logic statement corresponding to the logic circuit in part (i).
...........................................................................................................................................
.......................................................................................................................................[2]
R T W X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
6 A user watches a video available on a website. The website uses on-demand bit streaming.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
7 A small company produces scientific magazines. The owner buys some new desktop computers.
The computers are used to store thousands of colour images (diagrams and photographs). All the
computers have Internet access.
(a) Name three utility programs the company would use on all their computers. Describe what
each program does.
1 ................................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
Description ................................................................................................................................
...............................................................................................................................................[6]
(b) The images contained in the magazines are produced using either bitmap or vector graphics
software.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...............................................................................................................................................[4]
(c) Employees using the new computers receive training. At the end of the training, each
employee completes a series of questions.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) “Data validation is used to make sure that data keyed in are the same as the original data
supplied.”
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(iii) “The use of passwords will always prevent unauthorised access to the data stored on the
computers.”
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
8 The table shows assembly language instructions for a processor which has one general purpose
register, the Accumulator (ACC) and an Index Register (IX).
Instruction
Explanation
Op code Operand
LDD <address> Direct addressing. Load the contents of the given address to ACC.
Indexed addressing. Form the address from <address> + the
LDX <address> contents of the index register. Copy the contents of this calculated
address to ACC.
STO <address> Store contents of ACC at the given address.
ADD <address> Add the contents of the given address to ACC.
CMP <address> Compare contents of ACC with contents of <address>
Following a compare instruction, jump to <address> if the compare
JPE <address>
was True.
Following a compare instruction, jump to <address> if the compare
JPN <address>
was False.
JMP <address> Jump to the given address.
Output to the screen the character whose ASCII value is stored in
OUT
ACC.
END Return control to the operating system.
Main memory
800 0110 0100
801 0111 1100
802 1001 0111
803 0111 0011
804 1001 0000
805 0011 1111
806 0000 1110
807 1110 1000
808 1000 1110
809 1100 0010
:
:
2000 1011 0101
(a) (i) Show the contents of the Accumulator after execution of the instruction:
LDD 802
Accumulator:
[1]
(ii) Show the contents of the Accumulator after execution of the instruction:
LDX 800
Index Register: 0 0 0 0 1 0 0 1
Accumulator:
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
(b) (i) Complete the trace table below for the following assembly language program. This
program contains denary values.
Trace table:
Memory address
ACC OUTPUT
800 801 802 803
40 50 0 90
[4]
.......................................................................................................................................[1]
(c) The program used the ASCII coding system for character codes. An alternative coding system
is Unicode.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (ST) 122368/2
© UCLES 2016 [Turn over
2
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
01001101
...............................................................................................................................................[1]
(b) Convert the following denary number into Binary Coded Decimal (BCD).
82
...............................................................................................................................................[1]
(c) Convert the following two’s complement integer number into denary.
11001011
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(d) Convert the following denary number into hexadecimal. Show your working.
198
...............................................................................................................................................[2]
3 A company needs new software to manage its accounts. It is evaluating two different options. One
option is open source software and the other is commercial software.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
Identify four benefits to the company in choosing the commercial software option.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...............................................................................................................................................[4]
4 The table shows assembly language instructions for a processor which has one general purpose
register, the Accumulator (ACC) and an index register (IX).
Instruction Explanation
Op code Operand
LDD <address> Direct addressing. Load the contents of the given address to ACC.
Indexed addressing. Form the address from <address> + the contents of the
LDX <address>
index register. Copy the contents of this calculated address to ACC.
STO <address> Store contents of ACC at the given address.
DEC <register> Subtract 1 from the contents of the register (ACC or IX).
JPE <address> Following a compare instruction, jump to <address> if the compare was True.
JPN <address> Following a compare instruction, jump to <address> if the compare was False.
OUT Output to screen the character whose ASCII value is stored in ACC.
Index register: 1 1 0 0 1 1 0 1
(a) Show the contents of the index register after the execution of the instruction:
INC IX
Index register:
[1]
(b) Complete the trace table on the opposite page for the following assembly language program.
20 LDX 90
21 DEC ACC
22 STO 90
23 INC IX
24 LDX 90
25 DEC ACC
26 CMP 90
27 JPE 29
28 JPN 31
29 ADD 90
30 OUT
31 ADD 93
32 STO 93
33 OUT
34 END
:
:
90 2
91 90
92 55
93 34
IX 2
ASCII Code 65 66 67 68 69 70 71 72
Character A B C D E F G H
Trace table:
Memory address
Working ACC IX OUTPUT
Instruction
space 90 91 92 93
2 90 55 34 2
20
21
22
23
24
25
26
[7]
Feature Description
Data security
[3]
A school stores a large amount of data that includes student attendance, qualification and contact
details. The school is setting up a relational database to store these data.
Describe three factors to consider when planning a backup procedure for the data.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
© UCLES 2016 9608/13/M/J/16
9
(c) The database design has three tables to store the qualifications and grades each student has
attained. The following is a sample of the data from each table.
STUDENT
QUALIFICATION
STUDENT-QUALIFICATION
(i) Draw an Entity-Relationship (E-R) diagram to show the relationships between these
three tables.
[2]
(ii) State the type of relationship that exists between STUDENT and
STUDENT-QUALIFICATION.
.......................................................................................................................................[1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(d) (i) The database will store each student’s date of birth.
Write an SQL script to add a date of birth attribute to the appropriate table.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Write an SQL script to display the StudentID, Grade and DateOfAward for the
QualCode value of SC12.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
(iii) Write an SQL script to display the FirstName and LastName and QualCode for all
STUDENT-QUALIFICATIONs for which the Grade value is A.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
© UCLES 2016 9608/13/M/J/16
11
6 (a) Explain the difference between the World Wide Web (WWW) and the Internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Three methods of connecting devices include fibre-optic cables, copper cables and radio
waves. The table below gives descriptions relating to these connection methods.
Tick (✓) one box on each row to show the method that best fits each description.
(c) Bit streaming is used for both real-time and on-demand services.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(d) A device needs an IP address to connect to the Internet. IPv4 is the more common type of
IP address.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2016 9608/13/M/J/16 [Turn over
12
(e) A computer user keys in the Uniform Resource Locator (URL) of a web page into a web
browser.
Describe how the browser uses the Domain Name Service (DNS) to display the web page.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
7 A bank holds personal data about its customers and their financial data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Describe three security measures that the bank could implement to protect its electronic
data.
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (ST) 126463
© UCLES 2016 [Turn over
2
1 Three examples of language translators and four definitions are shown below.
Draw lines to link each language translator to the correct one or more definitions.
Compiler
Assembler
Interpreter
[3]
55
[1]
(b) Convert the following Binary Coded Decimal (BCD) number into denary.
10000011
...............................................................................................................................................[1]
(c) Convert the following denary integer into 8-bit two’s complement.
-102
[2]
4E
...............................................................................................................................................[1]
3 (a) Describe how special purpose registers are used in the fetch stage of the fetch-execute cycle.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Use the statements A, B, C and D to complete the description of how the fetch-execute cycle
handles an interrupt.
the address of the Interrupt Service Routine (ISR) is loaded to the Program
A
Counter (PC).
B the processor checks if there is an interrupt.
C when the ISR completes, the processor restores the register contents.
D the register contents are saved.
4 A group of students broadcast a school radio station on a website. They record their sound clips
(programmes) in advance and email them to the producer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) The students use software to compress the sound clips before emailing them.
(i) Circle your chosen method of compression and justify your choice.
Lossy / Lossless
Justification: .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
Students also email images to the radio station for use on its website.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
B 153
W 255
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 B B B B B B B B B B W W W B B B
1 B B B B B B B B B W W W W W W B
2 B B B B B B B W W W W W W W W W
95
Show how RLE will compress the first three rows of this image.
Row 1: ...............................................................................................................................
Row 2: ...............................................................................................................................
Row 3: ...........................................................................................................................[2]
5 Three types of software licensing and four descriptions are shown in the table below.
Put a tick (✓) in each row to match each description to the appropriate type of software licensing.
Type of software
Software is purchased
before it can be used
Source code comes with
the software
Software is provided free
on a trial basis
[4]
State three of the principles of the ACM/IEEE Software Engineering Code of Ethics. Illustrate
each one, with an example, describing how it will influence their working practices.
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
...............................................................................................................................................[1]
Indicate for each IP address whether it is valid or invalid and give a reason.
Denary / Valid or
Address Reason
Hexadecimal Invalid
3.2A.6AA.BBBB Hexadecimal
2.0.255.1 Denary
6.0.257.6 Denary
A.78.F4.J8 Hexadecimal
[4]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
8 A school stores a large amount of data. This includes student attendance, qualification, and
contact details. The school’s software uses a file-based approach to store this data.
.......................................................................................................................................[1]
(ii) Describe two ways in which the Database Administrator (DBA) could use the DBMS
software to ensure the security of the student data.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(iv) The DBMS has replaced software that used a file-based approach with a relational
database.
Describe how using a relational database has overcome the previous problems
associated with a file-based approach.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
(b) The database design has three tables to store the classes that students attend.
CLASS(ClassID, Subject)
CLASS-GROUP(StudentID, ClassID)
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
.......................................................................................................................................[1]
(iii) Write an SQL script to display the StudentID and FirstName of all students who are
in the tutor group 10B. Display the list in alphabetical order of LastName.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
(iv) Write an SQL script to display the LastName of all students who attend the class whose
ClassID is CS1.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
9 The table shows assembly language instructions for a processor which has one general purpose
register, the Accumulator (ACC) and an index register (IX).
Instruction
Explanation
Op code Operand
LDD <address> Direct addressing. Load the contents of the given address to ACC.
LDX <address> Indexed addressing. Form the address from <address> + the contents of the
index register. Copy the contents of this calculated address to ACC.
STO <address> Store contents of ACC at the given address.
DEC <register> Subtract 1 from the contents of the register (ACC or IX).
JPE <address> Following a compare instruction, jump to <address> if the compare was True.
JPN <address> Following a compare instruction, jump to <address> if the compare was
False.
JMP <address> Jump to the given address.
OUT Output to screen the character whose ASCII value is stored in ACC.
(a) The diagram shows the current contents of a section of main memory and the index register:
60 0011 0010
61 0101 1101
62 0000 0100
63 1111 1001
64 0101 0101
65 1101 1111
66 0000 1101
67 0100 1101
68 0100 0101
69 0100 0011
...
1000 0110 1001
Index register: 0 0 0 0 1 0 0 0
(i) Show the contents of the Accumulator after the execution of the instruction:
LDX 60
Accumulator:
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Show the contents of the index register after the execution of the instruction:
DEC IX
Index register:
[1]
(b) Complete the trace table on the opposite page for the following assembly language program.
50 LDD 100
51 ADD 102
52 STO 103
53 LDX 100
54 ADD 100
55 CMP 101
56 JPE 58
57 JPN 59
58 OUT
59 INC IX
60 LDX 98
61 ADD 101
62 OUT
63 END
...
100 20
101 100
102 1
103 0
IX (Index Register) 1
ASCII Code 118 119 120 121 122 123 124 125
Character v w x y z { | }
Trace table:
Memory address
Instruction Working ACC IX OUTPUT
address space 100 101 102 103
20 100 1 0 1
50
51
52
53
54
55
[7]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (ST) 122367/2
© UCLES 2016 [Turn over
2
1 Three examples of language translators and four definitions are shown below.
Draw lines to link each language translator to the correct one or more definitions.
Compiler
Assembler
Interpreter
[3]
55
[1]
(b) Convert the following Binary Coded Decimal (BCD) number into denary.
10000011
...............................................................................................................................................[1]
(c) Convert the following denary integer into 8-bit two’s complement.
-102
[2]
4E
...............................................................................................................................................[1]
3 (a) Describe how special purpose registers are used in the fetch stage of the fetch-execute cycle.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Use the statements A, B, C and D to complete the description of how the fetch-execute cycle
handles an interrupt.
the address of the Interrupt Service Routine (ISR) is loaded to the Program
A
Counter (PC).
B the processor checks if there is an interrupt.
C when the ISR completes, the processor restores the register contents.
D the register contents are saved.
4 A group of students broadcast a school radio station on a website. They record their sound clips
(programmes) in advance and email them to the producer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) The students use software to compress the sound clips before emailing them.
(i) Circle your chosen method of compression and justify your choice.
Lossy / Lossless
Justification: .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
Students also email images to the radio station for use on its website.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
B 153
W 255
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 B B B B B B B B B B W W W B B B
1 B B B B B B B B B W W W W W W B
2 B B B B B B B W W W W W W W W W
95
Show how RLE will compress the first three rows of this image.
Row 1: ...............................................................................................................................
Row 2: ...............................................................................................................................
Row 3: ...........................................................................................................................[2]
5 Three types of software licensing and four descriptions are shown in the table below.
Put a tick (✓) in each row to match each description to the appropriate type of software licensing.
Type of software
Software is purchased
before it can be used
Source code comes with
the software
Software is provided free
on a trial basis
[4]
State three of the principles of the ACM/IEEE Software Engineering Code of Ethics. Illustrate
each one, with an example, describing how it will influence their working practices.
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
...............................................................................................................................................[1]
Indicate for each IP address whether it is valid or invalid and give a reason.
Denary / Valid or
Address Reason
Hexadecimal Invalid
3.2A.6AA.BBBB Hexadecimal
2.0.255.1 Denary
6.0.257.6 Denary
A.78.F4.J8 Hexadecimal
[4]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
8 A school stores a large amount of data. This includes student attendance, qualification, and
contact details. The school’s software uses a file-based approach to store this data.
.......................................................................................................................................[1]
(ii) Describe two ways in which the Database Administrator (DBA) could use the DBMS
software to ensure the security of the student data.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(iv) The DBMS has replaced software that used a file-based approach with a relational
database.
Describe how using a relational database has overcome the previous problems
associated with a file-based approach.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
(b) The database design has three tables to store the classes that students attend.
CLASS(ClassID, Subject)
CLASS-GROUP(StudentID, ClassID)
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
.......................................................................................................................................[1]
(iii) Write an SQL script to display the StudentID and FirstName of all students who are
in the tutor group 10B. Display the list in alphabetical order of LastName.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
(iv) Write an SQL script to display the LastName of all students who attend the class whose
ClassID is CS1.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
9 The table shows assembly language instructions for a processor which has one general purpose
register, the Accumulator (ACC) and an index register (IX).
Instruction
Explanation
Op code Operand
LDD <address> Direct addressing. Load the contents of the given address to ACC.
LDX <address> Indexed addressing. Form the address from <address> + the contents of the
index register. Copy the contents of this calculated address to ACC.
STO <address> Store contents of ACC at the given address.
DEC <register> Subtract 1 from the contents of the register (ACC or IX).
JPE <address> Following a compare instruction, jump to <address> if the compare was True.
JPN <address> Following a compare instruction, jump to <address> if the compare was
False.
JMP <address> Jump to the given address.
OUT Output to screen the character whose ASCII value is stored in ACC.
(a) The diagram shows the current contents of a section of main memory and the index register:
60 0011 0010
61 0101 1101
62 0000 0100
63 1111 1001
64 0101 0101
65 1101 1111
66 0000 1101
67 0100 1101
68 0100 0101
69 0100 0011
...
1000 0110 1001
Index register: 0 0 0 0 1 0 0 0
(i) Show the contents of the Accumulator after the execution of the instruction:
LDX 60
Accumulator:
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Show the contents of the index register after the execution of the instruction:
DEC IX
Index register:
[1]
(b) Complete the trace table on the opposite page for the following assembly language program.
50 LDD 100
51 ADD 102
52 STO 103
53 LDX 100
54 ADD 100
55 CMP 101
56 JPE 58
57 JPN 59
58 OUT
59 INC IX
60 LDX 98
61 ADD 101
62 OUT
63 END
...
100 20
101 100
102 1
103 0
IX (Index Register) 1
ASCII Code 118 119 120 121 122 123 124 125
Character v w x y z { | }
Trace table:
Memory address
Instruction Working ACC IX OUTPUT
address space 100 101 102 103
20 100 1 0 1
50
51
52
53
54
55
[7]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (ST/SG) 118026
© UCLES 2015 [Turn over
2
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(i) Give two benefits of using bit streaming for this purpose.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(ii) State two potential problems of using bit streaming for this purpose.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(c) Explain the terms on-demand bit streaming and real-time bit streaming.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
2 (a)
Processor
Registers
System clock
B Control
unit ALU C
A
Main memory
A ...............................................................................................................................................
B ...............................................................................................................................................
C ...............................................................................................................................................
[3]
(b) State the role of each of the following special purpose registers used in a typical processor.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
http://cie.org.uk/computerscience.html
http ....................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
cie.org.uk ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
computerscience.html .......................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
%20 ...................................................................................................................................
...........................................................................................................................................
? ........................................................................................................................................
...........................................................................................................................................
[2]
4 Paul works part-time for a large software company. The company sells security software to
a number of banks. He also runs his own software company that produces and sells computer
games.
Draw lines to indicate whether each statement describes ethical or unethical behaviour.
Statement
Ethical
Unethical
Because his work load is increasing, Paul
is now using overseas companies to write
some of the routines used in his games
software.
[6]
The system detects when seismic activity is greater than 3 on the Richter Scale. Whenever this
happens, a printer in the control room prints a report.
(i) Identify the steps that are required in this monitoring system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
(ii) When the system detects high activity, operators may need to respond rapidly. A printer
is useful for hard copies, but may not be the best way to inform operators.
...........................................................................................................................................
.......................................................................................................................................[1]
(iii) Name an alternative output device for this monitoring system and give a reason for your
choice.
...........................................................................................................................................
...........................................................................................................................................
[2]
6 A company operates a chemical plant, which has a number of processes. Local computers monitor
these processes and collect data.
Engineers at the telco had to decide which type of cable to use. They considered the use of either
copper cable or fibre optic cable.
State two benefits of each type of cable. Each benefit must be clearly different.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
[4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(b) The diagram shows a computer network with connection to the Internet.
file server
mail server
...............................................................................................................................................[1]
(c) A web page offers a link for users to request another web page. The requested web page
contains HTML code and JavaScript code.
Put each statement in the correct sequence by writing the numbers 1 to 5 in the right-hand
column.
Sequence
Statement
number
The user clicks on the hyperlink and the web page is requested
from the web server
[5]
8 (a) Six computer graphics terms and seven descriptions are shown below.
Term Description
Bitmap graphic
Picture element
Image resolution
Pixel
Screen resolution
Vector graphic
Value quoted for a monitor specification,
such as 1024 × 768. The larger the
numbers, the more picture elements will
be displayed.
[6]
(b) (i) A black and white image is 512 pixels by 256 pixels.
Calculate the file size of this image in kilobytes (KB) (1 KB = 1024 bytes).
Show your working.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Give a reason why it is important to estimate the file size of an image.
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
Validation ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Verification ................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Data are to be transferred between two devices. Parity checks are carried out on the data.
Explain what is meant by a parity check. Give an example to illustrate your answer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
© UCLES 2015 9608/13/O/N/15 [Turn over
12
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
11 A game program is written which can be either interpreted or compiled. The table below shows five
statements about the use of interpreters and compilers.
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (ST/SW) 93611/4
© UCLES 2015 [Turn over
2
• hard disk
• DVD-RW
• flash memory
...................................................................................................................................................
DVD-RW ...................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
DVD-RW ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
DVD-RAM .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) The following table shows a list of five statements which describe the stages when a page is
printed using an inkjet printer.
Put each statement in the correct sequence by writing the numbers 1 to 5 in the right-hand
column.
Sequence
Statement
number
Paper feed stepper motor activated; sheet of paper fed from
paper tray
Printer driver translates data into a suitable format for the
printer
The print head moves across the page; ink is sprayed each
time the print head pauses for a fraction of a second
Paper feed stepper motor advances paper a fraction of a
cm after each complete head pass
Printer receives data from the computer and stores the data
in the printer’s buffer
[5]
S T U
(a) The x-coordinate of the centre of the three squares is held in three memory locations:
...........................................................................................................................................
.......................................................................................................................................[1]
...........................................................................................................................................
.......................................................................................................................................[1]
(i) Give the number of bits required to store each pixel for a black and white bitmap.
.......................................................................................................................................[1]
(ii) Identify how many bits are required to store each pixel for a 256-colour bitmap.
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) The following information refers to a music track being recorded on a CD:
(i) Calculate the number of bytes required to store one second of sampled music.
Show your working.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
Describe how you would calculate the number of megabytes required to store this track.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(c) When storing music tracks in a computer, the MP3 format is often used. This reduces file size
by about 90%.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
5 Bobby is a senior programmer at a software house which produces intruder detection software.
He also runs his own software company which develops and sells various computer applications.
The following table shows seven activities which Bobby carries out.
Put a tick (✓) in the appropriate column to identify if the activity is ethical or unethical.
6 (a) Describe the stored program concept for the basic Von Neumann model for a computer
system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
7 An amusement park has a website. This includes a page where potential visitors can enquire
about the price for an individual or group visit.
1 <html>
2 <head>
3 <title>Amusement park visit ticket cost</title>
4 </head>
5 <body>
6 Calculate my ticket price
7 <Script Language = "JavaScript">
8 var groupSize = prompt("Enter number of visitors in
your group)", "");
9 var groupPrice = groupSize * 20;
10 if (groupSize > 4)
11 {
12 groupPrice = groupPrice * 0.8;
13 }
14 alert("Price for the group is " + groupPrice);
15 alert("Thank you for your enquiry");
16 </Script>
17 </body>
18 </html>
(a) Give the range of line numbers in the web page script that are JavaScript code.
...............................................................................................................................................[1]
(b) (i) Give the identifiers of two variables which have been used by the programmer.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
.......................................................................................................................................[1]
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
.......................................................................................................................................[2]
Describe what is meant by these terms. For each method, explain why it is needed.
Verification ........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Validation ..........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
11.64.255.90
.......................................................................................................................................[4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
“When a user enters a URL into their web browser, the DNS service locates the required
resource.”
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
Name three other utility programs that might be required. State why each is needed.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (CW/SG) 112120/2
© UCLES 2015 [Turn over
2
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(i) Give two benefits of using bit streaming for this purpose.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(ii) State two potential problems of using bit streaming for this purpose.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(c) Explain the terms on-demand bit streaming and real-time bit streaming.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
2 (a)
Processor
Registers
System clock
B Control
unit ALU C
A
Main memory
A ...............................................................................................................................................
B ...............................................................................................................................................
C ...............................................................................................................................................
[3]
(b) State the role of each of the following special purpose registers used in a typical processor.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
http://cie.org.uk/computerscience.html
http ....................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
cie.org.uk ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
computerscience.html .......................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
%20 ...................................................................................................................................
...........................................................................................................................................
? ........................................................................................................................................
...........................................................................................................................................
[2]
4 Paul works part-time for a large software company. The company sells security software to
a number of banks. He also runs his own software company that produces and sells computer
games.
Draw lines to indicate whether each statement describes ethical or unethical behaviour.
Statement
Ethical
Unethical
Because his work load is increasing, Paul
is now using overseas companies to write
some of the routines used in his games
software.
[6]
The system detects when seismic activity is greater than 3 on the Richter Scale. Whenever this
happens, a printer in the control room prints a report.
(i) Identify the steps that are required in this monitoring system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
(ii) When the system detects high activity, operators may need to respond rapidly. A printer
is useful for hard copies, but may not be the best way to inform operators.
...........................................................................................................................................
.......................................................................................................................................[1]
(iii) Name an alternative output device for this monitoring system and give a reason for your
choice.
...........................................................................................................................................
...........................................................................................................................................
[2]
6 A company operates a chemical plant, which has a number of processes. Local computers monitor
these processes and collect data.
Engineers at the telco had to decide which type of cable to use. They considered the use of either
copper cable or fibre optic cable.
State two benefits of each type of cable. Each benefit must be clearly different.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
[4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(b) The diagram shows a computer network with connection to the Internet.
file server
mail server
...............................................................................................................................................[1]
(c) A web page offers a link for users to request another web page. The requested web page
contains HTML code and JavaScript code.
Put each statement in the correct sequence by writing the numbers 1 to 5 in the right-hand
column.
Sequence
Statement
number
The user clicks on the hyperlink and the web page is requested
from the web server
[5]
8 (a) Six computer graphics terms and seven descriptions are shown below.
Term Description
Bitmap graphic
Picture element
Image resolution
Pixel
Screen resolution
Vector graphic
Value quoted for a monitor specification,
such as 1024 × 768. The larger the
numbers, the more picture elements will
be displayed.
[6]
(b) (i) A black and white image is 512 pixels by 256 pixels.
Calculate the file size of this image in kilobytes (KB) (1 KB = 1024 bytes).
Show your working.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Give a reason why it is important to estimate the file size of an image.
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
Validation ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Verification ................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Data are to be transferred between two devices. Parity checks are carried out on the data.
Explain what is meant by a parity check. Give an example to illustrate your answer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
© UCLES 2015 9608/11/O/N/15 [Turn over
12
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
11 A game program is written which can be either interpreted or compiled. The table below shows five
statements about the use of interpreters and compilers.
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (AC/SG) 101101/3
© UCLES 2015 [Turn over
2
1 (a) (i) Using two’s complement, show how the following denary numbers could be stored in an
8-bit register:
124
–77
[2]
(ii) Convert the two numbers in part (a) (i) into hexadecimal.
124 ..................................................................................................................................
–77 ...................................................................................................................................
[2]
...................................................................................................................................... [1]
...........................................................................................................................................
...................................................................................................................................... [2]
2 Assemblers translate from assembly language to machine code. Some assemblers scan the
assembly language program twice; these are referred to as two-pass assemblers.
Write 1 or 2 to indicate whether the activity is carried out during the first pass or during the second
pass.
First pass or
Activity
second pass
[5]
3 (a) Give the definition of the terms firewall and authentication. Explain how they can help with the
security of data.
Firewall .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Authentication ...........................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
(b) Describe two differences between data integrity and data security.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(c) Data integrity is required at the input stage and also during transfer of the data.
(i) State two ways of maintaining data integrity at the input stage. Use examples to help
explain your answer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
(ii) State two ways of maintaining data integrity during data transmission. Use examples to
help explain your answer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
4 (a) There are two types of RAM: dynamic RAM (DRAM) and static RAM (SRAM).
[5]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
(c) DVD-RAM and flash memory are two examples of storage devices.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
5 (a) Name and describe three buses used in the von Neumann model.
Bus 1 .........................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Bus 2 .........................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Bus 3 .........................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
(b) The sequence of operations shows, in register transfer notation, the fetch stage of the fetch-
execute cycle.
1 MAR ← [PC]
2 PC ← [PC] + 1
3 MDR ← [[MAR]]
4 CIR ← [MDR]
...........................................................................................................................................
...................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [1]
...........................................................................................................................................
...................................................................................................................................... [1]
(c) Describe what happens to the registers when the following instruction is executed:
LDD 35
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [4]
6 (a) Three digital sensors A, B and C are used to monitor a process. The outputs from the sensors
are used as the inputs to a logic circuit.
B X
[5]
(b) Complete the truth table for the logic circuit described in part (a).
Working Space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(c) Write a logic statement that describes the following logic circuit.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
© UCLES 2015 9608/13/M/J/15
13
7 The table shows assembly language instructions for a processor which has one general purpose
register, the Accumulator (ACC).
Instruction
Explanation
Op code Operand
Main memory
(a) (i) Show the contents of the Accumulator after execution of the instruction:
LDD 121
Accumulator:
[1]
(ii) Show the contents of the Accumulator after execution of the instruction:
LDI 124
Accumulator:
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
(iii) Show the contents of the Accumulator after execution of the instruction:
LDX 120
Index Register: 0 0 0 0 0 1 1 0
Accumulator:
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
(b) Trace the assembly language program using the trace table.
320 49
321 36
322 0
323 0
Trace table:
Memory address
Accumulator
320 321 322 323
49 36 0 0
[6]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NH/SW) 111425
© UCLES 2015 [Turn over
2
10111000
...............................................................................................................................................[1]
97
...............................................................................................................................................[1]
(iii) Using two’s complement, show how the following denary numbers could be stored in an 8-bit
register:
114
- 93
[2]
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
(ii) Give one reason why 16-bit sampling is used in an audio compact disc (CD).
...........................................................................................................................................
.......................................................................................................................................[1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(iv) Give one benefit and one drawback of using a higher sampling resolution.
Benefit ...............................................................................................................................
...........................................................................................................................................
Drawback ..........................................................................................................................
.......................................................................................................................................[2]
(b) Describe two typical features found in software for editing sound files.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
(c) Explain the difference between lossless and lossy data compression techniques.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
[4]
For each of the following situations, name a different sensor that could be used.
.......................................................................................................................................[1]
.......................................................................................................................................[1]
.......................................................................................................................................[1]
(b) Sensors are used to monitor seismic activity. At the end of each day, all the data are
transmitted to a central computer. This is hundreds of kilometres away.
Describe one way of ensuring that the integrity of the data is retained during the transmission
stage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
• conventional telephones (using the Public Service Telephone Network (PSTN) system)
over a wired network
• a computer, equipped with speakers and microphone, connected to the Internet
Put a tick () in the correct column to match each description to the appropriate communication
method.
Conventional telephone
Description Internet-based system
using PSTN
connection only in use
whilst sound is being
transmitted
dedicated channel used
between two points for the
duration of the call
connection maintained
throughout the telephone
call
encoding schemes and
compression technology
used
lines remain active even
during a power outage
[5]
(b) Distinguish between the Internet and the World Wide Web (WWW).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(i) A device that transfers data from one network to another in an intelligent way. It has the
task of forwarding data packets to their destination by the most efficient route.
.......................................................................................................................................[1]
(ii) A device used between two dissimilar LANs. The device is required to convert data
packets from one protocol to another.
.......................................................................................................................................[1]
(iii) A device or software that provides a specific function for computers using a network. The
most common examples handle printing, file storage and the delivery of web pages.
.......................................................................................................................................[1]
6 (a) Name the most suitable input or output device for each of the following uses.
[5]
(b) All of the uses in part (a) involve the input or output of data.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
.......................................................................................................................................[2]
(ii) Describe one way of ensuring the security of the data against malicious damage.
...........................................................................................................................................
.......................................................................................................................................[1]
7 A system is monitored using sensors. The sensors output binary values corresponding to physical
conditions, as shown in the table:
Description of Binary
Parameter Description of condition
parameter value
1 pressure >= 3 bar
P oil pressure
0 pressure < 3 bar
1 temperature >= 200°C
T temperature
0 temperature < 200°C
1 rotation <= 1000 revs per minute (rpm)
R rotation
0 rotation > 1000 revs per minute (rpm)
The outputs of the sensors form the inputs to a logic circuit. The output from the circuit, X, is 1 if
any of the following three conditions occur:
T X
[5]
© UCLES 2015 9608/12/M/J/15
11
Workspace
P T R X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
8 (a) Explain how the width of the data bus and system clock speed affect the performance of a
computer system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) Most computers use Universal Serial Bus (USB) ports to allow the attachment of devices.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
(c) The table shows six stages in the von Neumann fetch-execute cycle.
Put the stages into the correct sequence by writing the numbers 1 to 6 in the right hand
column.
Sequence
Description of stage
number
the instruction is copied from the Memory Data Register (MDR) and placed
in the Current Instruction Register (CIR)
the address contained in the Program Counter (PC) is copied to the Memory
Address Register (MAR)
the value in the Program Counter (PC) is incremented so that it points to the
next instruction to be fetched
the instruction is copied from the memory location contained in the Memory
Address Register (MAR) and is placed in the Memory Data Register (MDR)
[6]
9 A database has been designed to store data about salespersons and the products they have sold.
The table ShopSales was the first attempt at designing the database.
(a) State why the table is not in First Normal Form (1NF).
...................................................................................................................................................
...............................................................................................................................................[1]
Using the data given in the first attempt table (ShopSales), show how these data are now
stored in the revised table designs.
Table: SalesPerson
FirstName Shop
Table: SalesProducts
[3]
(c) (i) A relationship between the two tables has been implemented.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Explain why the SalesProducts table is not in Third Normal Form (3NF).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (RW/SW) 93610/2
© UCLES 2015 [Turn over
2
10111000
...............................................................................................................................................[1]
97
...............................................................................................................................................[1]
(iii) Using two’s complement, show how the following denary numbers could be stored in an 8-bit
register:
114
- 93
[2]
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
(ii) Give one reason why 16-bit sampling is used in an audio compact disc (CD).
...........................................................................................................................................
.......................................................................................................................................[1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(iv) Give one benefit and one drawback of using a higher sampling resolution.
Benefit ...............................................................................................................................
...........................................................................................................................................
Drawback ..........................................................................................................................
.......................................................................................................................................[2]
(b) Describe two typical features found in software for editing sound files.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
(c) Explain the difference between lossless and lossy data compression techniques.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
[4]
For each of the following situations, name a different sensor that could be used.
.......................................................................................................................................[1]
.......................................................................................................................................[1]
.......................................................................................................................................[1]
(b) Sensors are used to monitor seismic activity. At the end of each day, all the data are
transmitted to a central computer. This is hundreds of kilometres away.
Describe one way of ensuring that the integrity of the data is retained during the transmission
stage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
• conventional telephones (using the Public Service Telephone Network (PSTN) system)
over a wired network
• a computer, equipped with speakers and microphone, connected to the Internet
Put a tick () in the correct column to match each description to the appropriate communication
method.
Conventional telephone
Description Internet-based system
using PSTN
connection only in use
whilst sound is being
transmitted
dedicated channel used
between two points for the
duration of the call
connection maintained
throughout the telephone
call
encoding schemes and
compression technology
used
lines remain active even
during a power outage
[5]
(b) Distinguish between the Internet and the World Wide Web (WWW).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(i) A device that transfers data from one network to another in an intelligent way. It has the
task of forwarding data packets to their destination by the most efficient route.
.......................................................................................................................................[1]
(ii) A device used between two dissimilar LANs. The device is required to convert data
packets from one protocol to another.
.......................................................................................................................................[1]
(iii) A device or software that provides a specific function for computers using a network. The
most common examples handle printing, file storage and the delivery of web pages.
.......................................................................................................................................[1]
6 (a) Name the most suitable input or output device for each of the following uses.
[5]
(b) All of the uses in part (a) involve the input or output of data.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
.......................................................................................................................................[2]
(ii) Describe one way of ensuring the security of the data against malicious damage.
...........................................................................................................................................
.......................................................................................................................................[1]
7 A system is monitored using sensors. The sensors output binary values corresponding to physical
conditions, as shown in the table:
Description of Binary
Parameter Description of condition
parameter value
1 pressure >= 3 bar
P oil pressure
0 pressure < 3 bar
1 temperature >= 200°C
T temperature
0 temperature < 200°C
1 rotation <= 1000 revs per minute (rpm)
R rotation
0 rotation > 1000 revs per minute (rpm)
The outputs of the sensors form the inputs to a logic circuit. The output from the circuit, X, is 1 if
any of the following three conditions occur:
T X
[5]
© UCLES 2015 9608/11/M/J/15
11
Workspace
P T R X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
8 (a) Explain how the width of the data bus and system clock speed affect the performance of a
computer system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) Most computers use Universal Serial Bus (USB) ports to allow the attachment of devices.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
(c) The table shows six stages in the von Neumann fetch-execute cycle.
Put the stages into the correct sequence by writing the numbers 1 to 6 in the right hand
column.
Sequence
Description of stage
number
the instruction is copied from the Memory Data Register (MDR) and placed
in the Current Instruction Register (CIR)
the address contained in the Program Counter (PC) is copied to the Memory
Address Register (MAR)
the value in the Program Counter (PC) is incremented so that it points to the
next instruction to be fetched
the instruction is copied from the memory location contained in the Memory
Address Register (MAR) and is placed in the Memory Data Register (MDR)
[6]
9 A database has been designed to store data about salespersons and the products they have sold.
The table ShopSales was the first attempt at designing the database.
(a) State why the table is not in First Normal Form (1NF).
...................................................................................................................................................
...............................................................................................................................................[1]
Using the data given in the first attempt table (ShopSales), show how these data are now
stored in the revised table designs.
Table: SalesPerson
FirstName Shop
Table: SalesProducts
[3]
(c) (i) A relationship between the two tables has been implemented.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Explain why the SalesProducts table is not in Third Normal Form (3NF).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.