0% found this document useful (0 votes)
177 views556 pages

Past Paper Ict

one of 'the best things' in the world
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
177 views556 pages

Past Paper Ict

one of 'the best things' in the world
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 556

Cambridge International AS & A Level

* 7 0 0 2 1 3 2 4 4 6 *

COMPUTER SCIENCE 9618/13


Paper 1 Theory Fundamentals May/June 2021

1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages.

DC (CJ) 205798/2
© UCLES 2021 [Turn over
2

1 Anya scans an image into her computer for a school project.

(a) The scanned image is a bitmapped image.

(i) Complete the following table to describe the two terms about graphics.

Term Description

...........................................................................................................................
Pixel ...........................................................................................................................

...........................................................................................................................

...........................................................................................................................
File header ...........................................................................................................................

...........................................................................................................................

[2]

(ii) The image is scanned with an image resolution of 1024 × 512 pixels, and a colour depth
of 8 bits per pixel.

Calculate an estimate for the file size, giving your answer in mebibytes. Show your
working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Answer .......................................... mebibytes


[3]

(b) The image is compressed using lossless compression.

Identify one method of lossless compression that can be used to compress the image and
describe how the method will reduce the file size.

Lossless compression method .................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]
© UCLES 2021 9618/13/M/J/21
3

(c) One of the colours used in the image has the hexadecimal colour code:

#FC238A

FC is the amount of red, 23 is the amount of green and 8A is the amount of blue in the colour.

(i) Convert the hexadecimal code FC into denary.

..................................................................................................................................... [1]

(ii) The amount of green in binary is 00100011. This has the denary number 15 added to it
to create a second colour.

Add the denary number 15 to the binary number 00100011 and give your answer in
binary.

Perform the addition in binary. Show your working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Answer (in binary) ........................................


[3]

(iii) Hexadecimal 23 in two’s complement representation is 00100011. The denary number


10 needs to be subtracted from this value.

Subtract the denary number 10 from the two’s complement representation 00100011.

Give your answer in binary. Show your working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Answer (in binary) ........................................


[3]

© UCLES 2021 9618/13/M/J/21 [Turn over


4

(d) Anya made sure that the image was not subject to any copyright before scanning it.

Describe what is meant by copyright.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2021 9618/13/M/J/21


5

2 Bingwen’s computer comes with an Operating System and utility software.

(a) Draw one line from each utility software to its correct description.

Utility software Description

Scans software for errors and repairs the


problems

Moves parts of files so that each file is


Disk formatter
contiguous in memory

Defragmentation Creates a copy of data that is no longer


required

Back-up Sets up a disk so it is ready to store files

Disk repair Scans for errors in a disk and corrects them

Creates a copy of data in case the original is


lost

[4]

(b) Identify four key management tasks that the Operating System will perform.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................

4 ................................................................................................................................................
[4]

© UCLES 2021 9618/13/M/J/21 [Turn over


6

3 A processor has one general purpose register, the Accumulator (ACC), and several special
purpose registers.

(a) Complete the following description of the role of the registers in the fetch-execute cycle by
writing the missing registers.

The ........................................................................ holds the address of the next instruction

to be loaded. This address is sent to the ........................................................................ .

The ............................................................................ holds the data fetched from this address.

This data is sent to the ............................................................................ and the Control Unit

decodes the instruction’s opcode.

The ............................................................................ is incremented.


[5]

© UCLES 2021 9618/13/M/J/21


7

(b) The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).

Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
LDD <address> Direct addressing. Load the contents of the location at the given address to ACC
Indirect addressing: The address to be used is at the given address. Load the
LDI <address>
contents of this second address to ACC
Indexed addressing. Form the address from <address> + the contents of the
LDX <address>
Index Register. Copy the contents of this calculated address to ACC
LDR #n Immediate addressing. Load the number n to IX
MOV <register> Move the contents of the accumulator to the given register (IX)
STO <address> Store contents of ACC at the given address
ADD <address> Add the contents of the given address to the ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP <address> Compare the contents of ACC with the contents of <address>
JPE <address> Following a compare instruction, jump to <address> if the compare was True
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
OUT Output to the screen the character whose ASCII value is stored in ACC
END Return control to the operating system
Bits in ACC are shifted logically n places to the left. Zeros are introduced on
LSL #n
the right hand end
Bits in ACC are shifted logically n places to the right. Zeros are introduced on
LSR #n
the left hand end
<address> can be an absolute address or a symbolic address
# denotes a denary number, e.g. #123

© UCLES 2021 9618/13/M/J/21 [Turn over


8

The current contents of the main memory and selected values from the ASCII character set
are shown.

Address Instruction ASCII code table (selected codes only)


200 LDD 365 ASCII code Character
201 CMP 366 65 A
202 JPE 209 66 B
203 INC ACC 67 C
204 STO 365 68 D
205 MOV IX
206 LDX 365
207 OUT
208 JMP 200
209 END

365 1
366 3
367 65
368 66
IX 0

© UCLES 2021 9618/13/M/J/21


9

Complete the trace table for the program currently in main memory.

Instruction Memory address


ACC IX Output
address 365 366 367 368

1 3 65 66 0

[6]

© UCLES 2021 9618/13/M/J/21 [Turn over


10

(c) (i) The Accumulator currently contains the binary number:

0 0 1 1 0 1 0 1

Write the contents of the Accumulator after the processor has executed the following
instruction:

LSL #2

[1]

(ii) The Accumulator currently contains the binary number:

0 0 1 1 0 1 0 1

Identify the mathematical operation that the following instruction will perform on the
contents of the accumulator.

LSR #3
...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2021 9618/13/M/J/21


11

4 Melinda and her friends set up a peer-to-peer network between their computers to share data.

(a) Describe the key features of a peer-to-peer network.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Describe two drawbacks to Melinda and her friends of using a peer-to-peer network.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(c) Melinda connects her laptop to the internet through her router.

(i) Tick (3) one box in each row to identify whether the task is performed by the router or
not.

Performed by Not performed


Task
router by router
Receives packets from devices
Finds the IP address of a Uniform Resource Locator (URL)
Directs each packet to all devices attached to it
Stores the IP and/or MAC address of all devices attached to it
[2]

© UCLES 2021 9618/13/M/J/21 [Turn over


12

(ii) Melinda mainly uses the internet to watch films and play computer games.

Tick (3) one box to identify whether Melinda should connect to the router using a wired
or wireless network and justify your choice.

Wired
Wireless

Justification .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(d) Melinda sends emails from her webmail account (email account accessed through a website).

Explain whether Melinda is using the internet, or the World Wide Web (WWW), or both.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2021 9618/13/M/J/21


13

5 Kiara has a washing machine and a refrigerator.

(a) She has an embedded system in her washing machine.

Describe what is meant by an embedded system, using the washing machine as an example.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) The washing machine’s embedded system makes use of both Random Access Memory
(RAM) and Read Only Memory (ROM).

State the purpose of RAM and ROM within the washing machine’s embedded system.

RAM ..........................................................................................................................................

...................................................................................................................................................

ROM .........................................................................................................................................

...................................................................................................................................................
[2]

(c) The temperature in her refrigerator must be kept between 4 and 6 degrees Celsius.

The microprocessor in the refrigerator turns on the cooling if the temperature is too high, and
turns off the cooling if the temperature is too low.

Explain why the system in the refrigerator is a control and not a monitoring system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2021 9618/13/M/J/21 [Turn over


14

6 Each of the following algorithms performs data validation.

State the type of validation check that each of the algorithms performs.

(a)

INPUT x

IF x < 0 OR x > 10 THEN

OUTPUT "Invalid"

ENDIF

.................................................................................................................................................... [1]

(b)

INPUT x

IF x = "" THEN

OUTPUT "Invalid"

ENDIF

.................................................................................................................................................... [1]

(c)

INPUT x

IF NOT(x = "Red" OR x = "Yellow" OR x = "Blue") THEN

OUTPUT "Invalid"

ENDIF

.................................................................................................................................................... [1]

© UCLES 2021 9618/13/M/J/21


15

7 Bobby and Kim are discussing databases.

(a) Bobby tells Kim that a file-based approach is usually better than a relational database.

Explain why Bobby is incorrect.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Bobby has a shop that sells products to customers. His database will store data about his
customers, their payment details, orders and the products he sells. Customers will have login
details to access their accounts. The database will update customers’ payment and login
details without keeping any historical records.

(i) Give one example of each of the following relationships from Bobby’s database.

one-to-one

...........................................................................................................................................

...........................................................................................................................................

one-to-many

...........................................................................................................................................

...........................................................................................................................................

many-to-many

...........................................................................................................................................

...........................................................................................................................................
[3]

(ii) Tick (3) one box to identify the relationship that cannot be directly implemented in a
normalised relational database.

Relationship Tick (3)

one-to-one

one-to-many

many-to-many
[1]
© UCLES 2021 9618/13/M/J/21 [Turn over
16

(iii) Bobby wants to name his database SHOPORDERS.

Write a Data Definition Language (DDL) statement to define a new database with the
name SHOPORDERS.

...........................................................................................................................................

..................................................................................................................................... [1]

(c) A database has a data dictionary.

Give three items that are stored in a data dictionary.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

8 Tick (3) one box in each row to identify the logic gate that each statement describes.

Statement AND NAND NOR XOR OR

The output is 1 only when both inputs are 1

The output is 1 only when both inputs are different

The output is 1 only when both inputs are 0

[3]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 9618/13/M/J/21


Cambridge International AS & A Level
* 3 0 1 4 9 9 4 8 4 1 *

COMPUTER SCIENCE 9618/12


Paper 1 Theory Fundamentals May/June 2021

1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (LK) 205797/1
© UCLES 2021 [Turn over
2

1 Raj owns houses that other people rent from him. He has a database that stores details about
the people who rent houses, and the houses they rent. The database, HOUSE_RENTALS, has the
following structure:

CUSTOMER(CustomerID, FirstName, LastName, DateOfBirth, Email)


HOUSE(HouseID, HouseNumber, Road, Town, Bedrooms, Bathrooms)
RENTAL(RentalID, CustomerID, HouseID, MonthlyCost, DepositPaid)

(a) Give the definition of the following database terms, using an example from the database
HOUSE_RENTALS for each definition.

Term Definition and example

..............................................................................................................................
Field
..............................................................................................................................

..............................................................................................................................

..............................................................................................................................
Entity
..............................................................................................................................

..............................................................................................................................

..............................................................................................................................
Foreign key
..............................................................................................................................

..............................................................................................................................
[6]

(b) Tick (3) one box to identify whether the database HOUSE_RENTALS is in Third Normal Form
(3NF) or not in 3NF.
Justify your choice using one or more examples from the database HOUSE_RENTALS.

In 3NF

Not in 3NF

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2021 9618/12/M/J/21


3

(c) Example data from the table RENTAL are given:

RentalID CustomerID HouseID MonthlyCost DepositPaid


1 22 15B5L 1000.00 Yes
2 13 3F 687.00 No
3 1 12AB 550.00 Yes
4 3 37 444.50 Yes

(i) Complete the following Data Definition Language (DDL) statement to define the table
RENTAL.

CREATE ...................................... ...................................... (

RentalID INTEGER NOT NULL,

CustomerID INTEGER NOT NULL,

HouseID ...................................... (5) NOT NULL,

MonthlyCost ...................................... NOT NULL,

DepositPaid BOOLEAN NOT NULL,

.......................................................... (RentalID)

);
[4]

(ii) Write a Data Manipulation Language (DML) script to return the first name and last name
of all customers who have not paid their deposit.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2021 9618/12/M/J/21 [Turn over


4

2 Aisha manages a team of software developers.

(a) Explain the reasons why it is important that Aisha acts ethically in relation to her team
members.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) The team are developing a computer game where the user plays a board game (such as
chess) against the computer.

Describe how the computer would use Artificial Intelligence (AI) to play the board game.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(c) The final game will be released under a licence.

Tick (3) one or more boxes in each row to identify the licence(s) each statement describes.

Free Open
Commercial
Statement Software Source Shareware
Software
Foundation Initiative

The user can edit the source code

The user must always pay before being


able to use the software

The user can redistribute the software

The user always gets a trial period

[4]

© UCLES 2021 9618/12/M/J/21


5

3 A logic expression is given:

S = (A AND B AND C) OR (B XOR C)

(a) Draw the logic circuit for the given expression.

B S

[4]

(b) Complete the truth table for the logic expression:

S = (A AND B AND C) OR (B XOR C)

A B C Working space S

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[2]

© UCLES 2021 9618/12/M/J/21 [Turn over


6

4 The table shows part of the instruction set for a processor. The processor has one general purpose
register, the Accumulator (ACC), and an Index Register (IX).

Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
Direct addressing. Load the contents of the location at the given address to
LDD <address>
ACC
STO <address> Store contents of ACC at the given address
ADD <address> Add the contents of the given address to the ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
DEC <register> Subtract 1 from the contents of the register (ACC or IX)
CMP <address> Compare the contents of ACC with the contents of <address>
JPE <address> Following a compare instruction, jump to <address> if the compare was True
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
IN Key in a character and store its ASCII value in ACC
OUT Output to the screen the character whose ASCII value is stored in ACC
END Return control to the operating system
# denotes a denary number, e.g. #123

The current contents of the main memory and selected values from the ASCII character set are:

Address Instruction ASCII code table (selected codes only)


70 IN ASCII code Character
71 CMP 100 65 A
72 JPE 80 66 B
73 CMP 101 67 C
74 JPE 76 68 D
75 JMP 80
76 LDD 102
77 INC ACC
78 STO 102
79 JMP 70
80 LDD 102
81 DEC ACC
82 STO 102
83 JMP 70

100 68
101 65
102 100

© UCLES 2021 9618/12/M/J/21


7

(a) Complete the trace table for the program currently in main memory when the following
characters are input:

A D
Do not trace the program any further when the third input is required.

Instruction Memory address


ACC
address 100 101 102
68 65 100

[4]

© UCLES 2021 9618/12/M/J/21 [Turn over


8

(b) Some bit manipulation instructions are shown in the table:

Instruction
Explanation
Opcode Operand
AND #n Bitwise AND operation of the contents of ACC with the operand
AND <address> Bitwise AND operation of the contents of ACC with the contents of <address>
XOR #n Bitwise XOR operation of the contents of ACC with the operand
XOR <address> Bitwise XOR operation of the contents of ACC with the contents of <address>
OR #n Bitwise OR operation of the contents of ACC with the operand
OR <address> Bitwise OR operation of the contents of ACC with the contents of <address>
<address> can be an absolute address or a symbolic address
# denotes a denary number, e.g. #123

The contents of the memory address 300 are shown:

Bit Number 7 6 5 4 3 2 1 0

300 0 1 1 0 0 1 1 0

(i) The contents of memory address 300 represent an unsigned binary integer.

Write the denary value of the unsigned binary integer in memory address 300.

..................................................................................................................................... [1]

(ii) An assembly language program needs to test if bit number 2 in memory address 300
is a 1.

Complete the assembly language instruction to perform this test.

......................... #4
[1]

(iii) An assembly language program needs to set bit numbers 4, 5, 6 and 7 to 0, but keep
bits 0 to 3 with their existing values.

Write the assembly language instruction to perform this action.

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2021 9618/12/M/J/21


9

5 Seth uses a computer for work.

(a) Complete the following descriptions of internal components of a computer by writing the
missing terms.

The ............................................................ transmits the signals to coordinate events based

on the electronic pulses of the ............................................................ .

The ............................................................ carries data to the components, while the

............................................................ carries the address where data needs to be written to

or read from.

The ............................................................ performs mathematical operations and

logical comparisons.
[5]

(b) Describe the ways in which the following factors can affect the performance of his laptop
computer.

Number of cores

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Clock speed

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2021 9618/12/M/J/21 [Turn over


10

(c) Seth accesses both software and data using cloud computing.

(i) Give two benefits of storing data using cloud computing.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(ii) Give two drawbacks of Seth using cloud computing.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2021 9618/12/M/J/21


11

(d) Draw one line from each term to its most appropriate description.

Term Description

It is only visible to devices within the Local


Area Network (LAN)

Public IP address
It increments by 1 each time the device
connects to the internet

Private IP address A new one is reallocated each time a device


connects to the internet

Dynamic IP address It can only be allocated to a router

It is visible to any device on the internet


Static IP address

It does not change each time a device


connects to the internet

[4]

© UCLES 2021 9618/12/M/J/21 [Turn over


12

6 A computer uses the ASCII character set.

(a) State the number of characters that can be represented by the ASCII character set and the
extended ASCII character set.

ASCII ...........................................................

Extended ASCII ...........................................................


[2]

(b) Explain how a word such as ‘HOUSE’ is represented by the ASCII character set.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) Unicode is a different character set.

The Unicode value for the character ‘1’ is denary value 49.

(i) Write the hexadecimal value for the Unicode character ‘1’.

..................................................................................................................................... [1]

(ii) Write the denary value for the Unicode character ‘5’.

..................................................................................................................................... [1]

© UCLES 2021 9618/12/M/J/21


13

7 Jennifer is writing a computer program for her A Level homework.

(a) Jennifer uses a program library to help her write her computer program.

Describe how a program library can be used while writing a computer program.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Jennifer uses an Integrated Development Environment (IDE) to write her computer program.

(i) The IDE allows Jennifer to use both an interpreter and a compiler while creating her
computer program.

Describe the ways in which Jennifer can use both a compiler and an interpreter while
developing the program.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) Identify two debugging tools that a typical IDE can provide.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2021 9618/12/M/J/21 [Turn over


14

8 A company has several security measures in place to prevent unauthorised access to the data on
its computers.

(a) Describe the difference between the security and privacy of data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Each employee has a username and password to allow them to log onto a computer. An
employee’s access rights to the data on the computers is set to either read-only, or read and
write.

Identify one other software-based measure that could be used to restrict the access to the
data on the computers.

...................................................................................................................................................

............................................................................................................................................. [1]

(c) The company is also concerned about threats posed by networks and the internet.

Identify two threats to the data that are posed by networks and the internet.

Threat 1 ....................................................................................................................................

...................................................................................................................................................

Threat 2 ....................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2021 9618/12/M/J/21


15

BLANK PAGE

© UCLES 2021 9618/12/M/J/21


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 9618/12/M/J/21


Cambridge International AS & A Level
* 2 2 1 1 3 9 3 4 1 4 *

COMPUTER SCIENCE 9618/11


Paper 1 Theory Fundamentals May/June 2021

1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages.

DC (PQ) 214537
© UCLES 2021 [Turn over
2

1 Anya scans an image into her computer for a school project.

(a) The scanned image is a bitmapped image.

(i) Complete the following table to describe the two terms about graphics.

Term Description

...........................................................................................................................
Pixel ...........................................................................................................................

...........................................................................................................................

...........................................................................................................................
File header ...........................................................................................................................

...........................................................................................................................

[2]

(ii) The image is scanned with an image resolution of 1024 × 512 pixels, and a colour depth
of 8 bits per pixel.

Calculate an estimate for the file size, giving your answer in mebibytes. Show your
working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Answer .......................................... mebibytes


[3]

(b) The image is compressed using lossless compression.

Identify one method of lossless compression that can be used to compress the image and
describe how the method will reduce the file size.

Lossless compression method .................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]
© UCLES 2021 9618/11/M/J/21
3

(c) One of the colours used in the image has the hexadecimal colour code:

#FC238A

FC is the amount of red, 23 is the amount of green and 8A is the amount of blue in the colour.

(i) Convert the hexadecimal code FC into denary.

..................................................................................................................................... [1]

(ii) The amount of green in binary is 00100011. This has the denary number 15 added to it
to create a second colour.

Add the denary number 15 to the binary number 00100011 and give your answer in
binary.

Perform the addition in binary. Show your working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Answer (in binary) ........................................


[3]

(iii) Hexadecimal 23 in two’s complement representation is 00100011. The denary number


10 needs to be subtracted from this value.

Subtract the denary number 10 from the two’s complement representation 00100011.

Give your answer in binary. Show your working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Answer (in binary) ........................................


[3]

© UCLES 2021 9618/11/M/J/21 [Turn over


4

(d) Anya made sure that the image was not subject to any copyright before scanning it.

Describe what is meant by copyright.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2021 9618/11/M/J/21


5

2 Bingwen’s computer comes with an Operating System and utility software.

(a) Draw one line from each utility software to its correct description.

Utility software Description

Scans software for errors and repairs the


problems

Moves parts of files so that each file is


Disk formatter
contiguous in memory

Defragmentation Creates a copy of data that is no longer


required

Back-up Sets up a disk so it is ready to store files

Disk repair Scans for errors in a disk and corrects them

Creates a copy of data in case the original is


lost

[4]

(b) Identify four key management tasks that the Operating System will perform.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................

4 ................................................................................................................................................
[4]

© UCLES 2021 9618/11/M/J/21 [Turn over


6

3 A processor has one general purpose register, the Accumulator (ACC), and several special
purpose registers.

(a) Complete the following description of the role of the registers in the fetch-execute cycle by
writing the missing registers.

The ........................................................................ holds the address of the next instruction

to be loaded. This address is sent to the ........................................................................ .

The ............................................................................ holds the data fetched from this address.

This data is sent to the ............................................................................ and the Control Unit

decodes the instruction’s opcode.

The ............................................................................ is incremented.


[5]

© UCLES 2021 9618/11/M/J/21


7

(b) The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).

Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
LDD <address> Direct addressing. Load the contents of the location at the given address to ACC
Indirect addressing: The address to be used is at the given address. Load the
LDI <address>
contents of this second address to ACC
Indexed addressing. Form the address from <address> + the contents of the
LDX <address>
Index Register. Copy the contents of this calculated address to ACC
LDR #n Immediate addressing. Load the number n to IX
MOV <register> Move the contents of the accumulator to the given register (IX)
STO <address> Store contents of ACC at the given address
ADD <address> Add the contents of the given address to the ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP <address> Compare the contents of ACC with the contents of <address>
JPE <address> Following a compare instruction, jump to <address> if the compare was True
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
OUT Output to the screen the character whose ASCII value is stored in ACC
END Return control to the operating system
Bits in ACC are shifted logically n places to the left. Zeros are introduced on
LSL #n
the right hand end
Bits in ACC are shifted logically n places to the right. Zeros are introduced on
LSR #n
the left hand end
<address> can be an absolute address or a symbolic address
# denotes a denary number, e.g. #123

© UCLES 2021 9618/11/M/J/21 [Turn over


8

The current contents of the main memory and selected values from the ASCII character set
are shown.

Address Instruction ASCII code table (selected codes only)


200 LDD 365 ASCII code Character
201 CMP 366 65 A
202 JPE 209 66 B
203 INC ACC 67 C
204 STO 365 68 D
205 MOV IX
206 LDX 365
207 OUT
208 JMP 200
209 END

365 1
366 3
367 65
368 66
IX 0

© UCLES 2021 9618/11/M/J/21


9

Complete the trace table for the program currently in main memory.

Instruction Memory address


ACC IX Output
address 365 366 367 368

1 3 65 66 0

[6]

© UCLES 2021 9618/11/M/J/21 [Turn over


10

(c) (i) The Accumulator currently contains the binary number:

0 0 1 1 0 1 0 1

Write the contents of the Accumulator after the processor has executed the following
instruction:

LSL #2

[1]

(ii) The Accumulator currently contains the binary number:

0 0 1 1 0 1 0 1

Identify the mathematical operation that the following instruction will perform on the
contents of the accumulator.

LSR #3
...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2021 9618/11/M/J/21


11

4 Melinda and her friends set up a peer-to-peer network between their computers to share data.

(a) Describe the key features of a peer-to-peer network.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Describe two drawbacks to Melinda and her friends of using a peer-to-peer network.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(c) Melinda connects her laptop to the internet through her router.

(i) Tick (3) one box in each row to identify whether the task is performed by the router or
not.

Performed by Not performed


Task
router by router
Receives packets from devices
Finds the IP address of a Uniform Resource Locator (URL)
Directs each packet to all devices attached to it
Stores the IP and/or MAC address of all devices attached to it
[2]

© UCLES 2021 9618/11/M/J/21 [Turn over


12

(ii) Melinda mainly uses the internet to watch films and play computer games.

Tick (3) one box to identify whether Melinda should connect to the router using a wired
or wireless network and justify your choice.

Wired
Wireless

Justification .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(d) Melinda sends emails from her webmail account (email account accessed through a website).

Explain whether Melinda is using the internet, or the World Wide Web (WWW), or both.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2021 9618/11/M/J/21


13

5 Kiara has a washing machine and a refrigerator.

(a) She has an embedded system in her washing machine.

Describe what is meant by an embedded system, using the washing machine as an example.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) The washing machine’s embedded system makes use of both Random Access Memory
(RAM) and Read Only Memory (ROM).

State the purpose of RAM and ROM within the washing machine’s embedded system.

RAM ..........................................................................................................................................

...................................................................................................................................................

ROM .........................................................................................................................................

...................................................................................................................................................
[2]

(c) The temperature in her refrigerator must be kept between 4 and 6 degrees Celsius.

The microprocessor in the refrigerator turns on the cooling if the temperature is too high, and
turns off the cooling if the temperature is too low.

Explain why the system in the refrigerator is a control and not a monitoring system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2021 9618/11/M/J/21 [Turn over


14

6 Each of the following algorithms performs data validation.

State the type of validation check that each of the algorithms performs.

(a)

INPUT x

IF x < 0 OR x > 10 THEN

OUTPUT "Invalid"

ENDIF

.................................................................................................................................................... [1]

(b)

INPUT x

IF x = "" THEN

OUTPUT "Invalid"

ENDIF

.................................................................................................................................................... [1]

(c)

INPUT x

IF NOT(x = "Red" OR x = "Yellow" OR x = "Blue") THEN

OUTPUT "Invalid"

ENDIF

.................................................................................................................................................... [1]

© UCLES 2021 9618/11/M/J/21


15

7 Bobby and Kim are discussing databases.

(a) Bobby tells Kim that a file-based approach is usually better than a relational database.

Explain why Bobby is incorrect.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Bobby has a shop that sells products to customers. His database will store data about his
customers, their payment details, orders and the products he sells. Customers will have login
details to access their accounts. The database will update customers’ payment and login
details without keeping any historical records.

(i) Give one example of each of the following relationships from Bobby’s database.

one-to-one

...........................................................................................................................................

...........................................................................................................................................

one-to-many

...........................................................................................................................................

...........................................................................................................................................

many-to-many

...........................................................................................................................................

...........................................................................................................................................
[3]

(ii) Tick (3) one box to identify the relationship that cannot be directly implemented in a
normalised relational database.

Relationship Tick (3)

one-to-one

one-to-many

many-to-many
[1]
© UCLES 2021 9618/11/M/J/21 [Turn over
16

(iii) Bobby wants to name his database SHOPORDERS.

Write a Data Definition Language (DDL) statement to define a new database with the
name SHOPORDERS.

...........................................................................................................................................

..................................................................................................................................... [1]

(c) A database has a data dictionary.

Give three items that are stored in a data dictionary.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

8 Tick (3) one box in each row to identify the logic gate that each statement describes.

Statement AND NAND NOR XOR OR

The output is 1 only when both inputs are 1

The output is 1 only when both inputs are different

The output is 1 only when both inputs are 0

[3]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 9618/11/M/J/21


Cambridge International AS & A Level
* 1 0 7 9 3 9 2 7 5 2 *

COMPUTER SCIENCE 9608/13


Paper 1 Theory Fundamentals October/November 2020

1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

DC (JC/CT) 188578/2
© UCLES 2020 [Turn over
2

1 Identify the most appropriate utility program to use for each of the following tasks.

Task Utility program

Rearrange the data on a disk so that files are


contiguous, and all free space is collected together

Prepare a disk for initial use

Reduce the size of a file

Examine a disk to find any bad sectors

[4]

2 Four terms about videos are given with six descriptions.

Draw one line from each term relating to videos to its correct description.

Term Description

The number of images that are displayed per second

The number of pixels per unit of measurement


Progressive encoding
e.g. per inch

Each frame is split into two fields: the first field


contains only the odd lines, the second field contains
Frame rate the even lines

Only the pixels that have changed are transmitted

Interlaced encoding

The complete frame is reproduced in each scan of


the image

Image resolution

The number of pixels in the image

[4]
© UCLES 2020 9608/13/O/N/20
3

3 Hannah is writing a computer program using a high-level language. She uses both a compiler and
an interpreter.

(a) Describe the ways in which Hannah will use an interpreter while writing the program.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Explain the reasons why Hannah uses a compiler when she has finished writing the program.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) Some high-level languages are partially compiled and partially interpreted.

Give one benefit and one drawback of using a language that is partially compiled and partially
interpreted.

Benefit ......................................................................................................................................

...................................................................................................................................................

Drawback ..................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2020 9608/13/O/N/20 [Turn over


4

4 A laptop on a home network connects to the Internet through a router.

(a) The laptop has an IP address.

(i) Give the reasons why the laptop has an IP address.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) The laptop’s IP address is private.

Give the reasons why the laptop does not have a public IP address.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) The router has an IPv4 address.

Give three differences between the format of an IPv4 address and an IPv6 address.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2020 9608/13/O/N/20


5

(b) A Public Switched Telephone Network (PSTN) is one example of a communication system
that can be used to support the Internet.

Identify and describe two other communication systems that can be used to support the
Internet.

System 1 ...................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

System 2 ...................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2020 9608/13/O/N/20 [Turn over


6

(c) A web page contains PHP code.

(i) Complete the following table by writing a description of the function of each line of PHP
code.

PHP code Description

echo "Hello World";

$number1 = 22;

$newValue = $_GET["number"];

print "Hello " . $name . "<br>";

[4]

(ii) PHP is a server-side scripting language.

Give an example of a client-side scripting language.

...........................................................................................................................................

..................................................................................................................................... [1]

(d) The laptop includes a parity bit in each byte it transmits.

Explain how parity checks protect the integrity of the data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2020 9608/13/O/N/20


7

5 The fetch-execute cycle is used when a computer processor runs a program.

(a) (i) Complete the table by writing the register transfer notation for each of the descriptions.

Letter Description Register transfer notation


The Memory Address Register (MAR) stores an
A address. The contents of this stored address are
copied to the Memory Data Register (MDR).

The contents of the Program Counter (PC) are


B
copied to the Memory Address Register (MAR).

The contents of the Memory Data Register (MDR)


C
are copied to the Current Instruction Register (CIR).

The contents of the Program Counter (PC) are


D
incremented.

[4]

(ii) Write one of the letters A, B, C or D (from the table above) on each row (1 to 4), to show
the correct order of the fetch-execute cycle.

1 ................................

2 ................................

3 ................................

4 ................................
[2]

(b) Buses are used to transfer data between various components of the computer system.

Tick (✓) one or more boxes on each row to identify the bus(es) each statement describes.

Statement Address bus Control bus Data bus


Receives data from the MAR
Carries an address or an instruction or a
value
Transmits timing signals to components
Bidirectional
[2]

© UCLES 2020 9608/13/O/N/20 [Turn over


8

(c) The following table shows assembly language instructions for a processor that has one
general purpose register, the Accumulator (ACC).

Instruction
Explanation
Op code Operand
INV Input a denary value from the keyboard and store it in ACC.
LDD <address> Direct addressing. Load the contents of the location at the given address to ACC.
LDM #n Immediate addressing. Load the denary number n to ACC.
Indirect addressing. The address to be used is at the given address. Load the
LDI <address>
contents of this second address to ACC.
ADD <address> Add the contents of the given address to ACC.
OUT Output to screen the character whose ASCII value is stored in ACC.
INC <register> Add 1 to the contents of the register (ACC or IX).
CMP <address> Compare the contents of ACC with the contents of <address>.
JPE <address> Following a compare instruction, jump to <address> if the compare was True.
JPN <address> Following a compare instruction, jump to <address> if the compare was False.
STO <address> Store contents of ACC at the given address.
END Return control to the operating system.

(i) The assembly language instructions are grouped according to their function.

Write one example of an op code from the table of instructions for each of the following
groups.

Arithmetic ............................................................

Data movement ............................................................


[2]

(ii) The current contents of the main memory are:

Address Instruction
500 INV
501 STO 901
502 INV
503 STO 900
504 ADD 902
505 STO 902
506 LDD 903
507 INC ACC
508 STO 903
509 CMP 901
510 JPN 502
511 END

900
901
902 0
903 0
© UCLES 2020 9608/13/O/N/20
9

Trace the program currently in memory using the following trace table when the values
2, 10 and 3 are input.

The first instruction has been completed for you.

Memory address
Instruction
ACC
address
900 901 902 903

0 0

500 2

[6]
© UCLES 2020 9608/13/O/N/20 [Turn over
10

(d) The current contents of a general-purpose register X are:

X 1 1 0 0 1 0 1 0

(i) The contents of X represent an unsigned binary integer.

Convert the contents of X into denary.

..................................................................................................................................... [1]

(ii) The contents of X represent a two’s complement binary integer.

Convert the contents of X into denary.

..................................................................................................................................... [1]

(iii) State why the binary number in X cannot represent a Binary Coded Decimal (BCD).

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2020 9608/13/O/N/20


11

6 Lara is managing a team of software developers who are writing a computer program.

(a) Benedict is one of the developers. He is struggling to keep up with his workload.

Describe the ways in which Lara can ethically support Benedict.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Lara has identified that when a specific sequence of actions is performed in the program, a
run-time error causes the program to crash.

She has decided there is not enough time to debug the code because the client needs the
system urgently, and there is a possibility that the client may never perform this sequence of
actions.

Explain the reasons why Lara is not acting ethically.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) The client wants to copyright the final program so that no one else can copy or amend it.

(i) State the purpose of copyrighting the computer program.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Identify two software licences that would be appropriate for the program.

Licence 1 ...........................................................................................................................

Licence 2 ...........................................................................................................................
[2]

(iii) Identify one software licence that would not be appropriate for the program. Justify your
choice.

Software licence ................................................................................................................

Justification .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[2]
© UCLES 2020 9608/13/O/N/20 [Turn over
12

7 Wilbur uses vector graphics to create a logo for his company.

Wilbur Designs

(a) Describe how the logo is represented and encoded by the computer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Wilbur scans a hand drawn image. The scanned image uses 8 bits to store the colour for
each pixel. The image is 2048 pixels wide by 1024 pixels high.

(i) Calculate an estimate of the file size of the scanned image. Give your answer rounded to
the nearest MB.

Show your working.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Answer ................................. MB
[2]

© UCLES 2020 9608/13/O/N/20


13

(ii) Wilbur wants to compress the scanned image before emailing it to his colleague.

Describe one lossy compression technique that Wilbur can use to compress this image.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

© UCLES 2020 9608/13/O/N/20 [Turn over


14

8 Consider the following logic circuit.

B X

(a) Complete the truth table for the logic circuit.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1

[4]

(b) Identify one logic gate not used in the logic circuit shown. Complete the truth table for this
logic gate with the inputs A and B.

Logic gate .................................................................................................................................

A B Output
0 0
0 1
1 0
1 1
[2]
© UCLES 2020 9608/13/O/N/20
15

BLANK PAGE

© UCLES 2020 9608/13/O/N/20


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 9608/13/O/N/20


Cambridge International AS & A Level
* 2 6 8 9 5 3 3 7 0 3 *

COMPUTER SCIENCE 9608/12


Paper 1 Theory Fundamentals October/November 2020

1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

DC (KN) 188577/1
© UCLES 2020 [Turn over
2

1 Different types of data can be represented in a computer system.

(a) Numeric is one type of data.

(i) Convert the following denary number into Binary Coded Decimal (BCD).

105

..................................................................................................................................... [1]

(ii) Convert the following two’s complement binary integer into denary.

10111111

..................................................................................................................................... [1]

(iii) Convert the following hexadecimal number into denary.

AB

..................................................................................................................................... [1]

© UCLES 2020 9608/12/O/N/20


3

(b) Character is another type of data.

The following tables show part of the ASCII code character set.

Character Denary value Character Denary value


A 65 a 97
B 66 b 98
C 67 c 99
D 68 d 100
E 69 e 101

(i) Describe how the computer uses ASCII codes to represent characters.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Convert the following string into ASCII codes.

Bed

...........................................................................................................................................

..................................................................................................................................... [1]

(iii) Give the denary ASCII code for the following character.

..................................................................................................................................... [1]

© UCLES 2020 9608/12/O/N/20 [Turn over


4

2 One method of compressing a file is run-length encoding (RLE).

(a) Describe, using an example, how a text file is compressed using RLE.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Explain why run-length encoding will sometimes increase the size of a text file.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

3 (a) Complete the following statements about CPU architecture by filling in the missing terms.

The Von Neumann model for a computer system uses the ....................................... program
concept.

A program is a series of instructions that are saved in ....................................... .

The processor ....................................... each instruction, ....................................... it and then

....................................... it.

The processor uses several ....................................... to store the data and instructions from

the program because they can be accessed faster than main memory.
[6]

© UCLES 2020 9608/12/O/N/20


5

BLANK PAGE

© UCLES 2020 9608/12/O/N/20 [Turn over


6

(b) The following table shows assembly language instructions for a processor that has one
general purpose register, the Accumulator (ACC).

Instruction
Explanation
Op code Operand
Direct addressing. Load the contents of the location at the given address to
LDD <address>
ACC.
LDM #n Immediate addressing. Load the denary number n to ACC.
Indirect addressing. The address to be used is at the given address. Load the
LDI <address>
contents of this second address to ACC.
STO <address> Store contents of ACC at the given address.

ADD <address> Add the contents of the given address to ACC.

CMP <address> Compare the contents of ACC with the contents of <address>.

OUT Output to screen the character whose ASCII value is stored in ACC.

INC <register> Add 1 to the contents of the register (ACC or IX).

JPE <address> Following a compare instruction, jump to <address> if the compare was True.
Following a compare instruction, jump to <address> if the compare was
JPN <address>
False.
END Return control to the operating system.

(i) The current contents of the


main memory are:

Address Instruction ASCII code table (Selected codes only)


50 LDD 80 ASCII Code Character
51 ADD 80 38 &
52 STO 80 39 ‘
53 LDD 82 40 (
54 INC ACC 41 )
55 STO 82 42 *
56 CMP 81
57 JPN 50
58 LDD 80
59 OUT
60 END

80 10
81 2
82 0

© UCLES 2020 9608/12/O/N/20


7

Trace the program currently in memory using the following trace table.
The first instruction has been completed for you.

Instruction Memory address


ACC Output
address 80 81 82

10 2 0

50 10

[5]

© UCLES 2020 9608/12/O/N/20 [Turn over


8

(ii) Assembly language instructions can be put into groups.

Tick (✓) one box in each column to identify the appropriate instruction group for each of
the three assembly language instructions.

Assembly language instruction


Instruction group
STO 80 JPN 50 INC ACC

Input and output of data

Data movement

Arithmetic operations

Unconditional and conditional jump instructions

Compare instructions

[3]

4 (a) Complete the truth table for the logic expression:

X = ((A NOR B) AND (C XOR A)) OR B

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

(b) Describe the difference between the operation of an AND gate and a NAND gate.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]
© UCLES 2020 9608/12/O/N/20
9

5 A teacher uses a relational database, RESULTS, to store data about her students and their test
results.

(a) Describe the benefits to the teacher of using a relational database instead of a file-based
approach.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) The teacher sets up the RESULTS database using a Database Management System (DBMS).

(i) Explain the ways in which the developer interface of a DBMS will help the teacher set up
the database.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) The DBMS creates a data dictionary for the RESULTS database.

Identify three items that will be included in the data dictionary.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

© UCLES 2020 9608/12/O/N/20 [Turn over


10

(c) The RESULTS database has the following structure:

STUDENT(StudentID, FirstName, LastName, Class, TargetGrade)

TEST(TestID, Topic, MaxMarks)

STUDENT_TEST(StudentID, TestID, Mark)

(i) Complete the following table by giving one example of each database term from the
database RESULTS. Give both the field name and the corresponding table name.

Database term Field name Table name

Primary key

Foreign key

Attribute

[3]

(ii) Tick (✓) one box to identify whether the database RESULTS is in 1NF, 2NF or 3NF.
Justify your choice.

1NF 2NF 3NF

Justification: ......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(iii) Complete the Data Manipulation Language (DML) script to display the Student ID, mark
and maximum marks for all tests with the topic of ‘Programming’.

SELECT StudentID, Mark, ........................................................

FROM STUDENT_TEST, ........................................................

........................................................ Topic = "Programming"

AND ........................................................ = ........................................................;


[5]

© UCLES 2020 9608/12/O/N/20


11

(iv) The teacher wants to implement validation to make sure that all data entered into the
database RESULTS are reasonable.

Name three different methods of data validation that can be used in the RESULTS
database. Describe how each method will limit the data that can be entered in this
database.

Method 1 ...........................................................................................................................

Description ........................................................................................................................

...........................................................................................................................................

Method 2 ...........................................................................................................................

Description ........................................................................................................................

...........................................................................................................................................

Method 3 ...........................................................................................................................

Description ........................................................................................................................

...........................................................................................................................................
[6]

(d) The teacher stores the database on the desktop computer in her classroom.

(i) Explain why it is important to keep the database secure.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Explain the ways in which the teacher can use data backup and disk mirroring to limit the
amount of data lost in the event of hardware failure.

Data backup

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Disk mirroring

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]
© UCLES 2020 9608/12/O/N/20 [Turn over
12

6 Malika has started a new job as a trainee software engineer.

(a) Malika’s manager has asked her to work with a senior software engineer for the first week.

Explain the ways in which Malika’s manager has acted ethically.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Malika researched the company and the programming languages used by the company
before she started the job.

Explain the ways in which Malika has acted ethically.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) Malika thinks that her colleagues do not like her, so she asks her manager for help.

Describe the actions the manager could take to support Malika in an ethical way.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2020 9608/12/O/N/20


13

7 A web server has a public IPv4 address.

(a) Draw lines to link each characteristic to its appropriate IP address.

Characteristic IP address

Can use hexadecimal notation

Each group of digits is a number


between 0 and 65535
IPv4

Consists of four groups of digits

IPv6

Uses double colons (::)

The total length of the address is 32 bits

[2]

(b) IP addresses can be static or dynamic.

Explain the reasons for the web server using a static instead of a dynamic IP address.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2020 9608/12/O/N/20


14

BLANK PAGE

© UCLES 2020 9608/12/O/N/20


15

BLANK PAGE

© UCLES 2020 9608/12/O/N/20


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 9608/12/O/N/20


Cambridge International AS & A Level
* 1 2 4 3 8 1 3 2 4 9 *

COMPUTER SCIENCE 9608/11


Paper 1 Theory Fundamentals October/November 2020

1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

DC (CJ) 188576/2
© UCLES 2020 [Turn over
2

1 Draw one or more lines to link each language translator to the most appropriate statement(s).

Language translator Statements

Converts a low-level language


instruction into binary

Stops as soon as it finds a syntax error

Compiler
Needs the source code to be present
when the user’s program is run

Reports all errors found at the end of


the process

Corrects syntax errors as they are


detected
Interpreter

Converts a high-level language into a


different form

Creates an executable file

[3]

© UCLES 2020 9608/11/O/N/20


3

2 A veterinary surgery cares for sick animals. The surgery has a file-based database that stores
data about the pets, their owners, and appointments made with the surgery.

The surgery wants to upgrade to a relational database.

(a) Explain the reasons why the surgery should upgrade their database.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) The design for the surgery database, SURGERY, is:

PET(PetID, OwnerFirstName, OwnerLastName, PetName, PetBreed,


PetDateOfBirth, TelephoneNumber)

APPOINTMENT(AppointmentID, Date, Time, StaffID, PetID)

(i) Give one reason why the database design for SURGERY is not in Third Normal Form
(3NF).

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2020 9608/11/O/N/20 [Turn over


4

(ii) The database needs to be normalised to 3NF. A pet may have more than one owner and
an owner may have more than one pet.

The appointment table does not need to change and has been repeated below.

Give the name and attributes of three additional tables in 3NF. Identify the primary
key(s) in each table.

APPOINTMENT(AppointmentID, Date, Time, StaffID, PetID)

Table 1 ...............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Table 2 ...............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Table 3 ...............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

(c) Part of the table APPOINTMENT is shown. The veterinary surgery uses Data Manipulation
Language (DML) statements to search for appointments.

AppointmentID Date Time StaffID PetID


222010 02/02/2021 12:40 JK1 20CF
222011 02/02/2021 12:40 PP2 10DT
222012 02/02/2021 12:50 JK1 9RR
222013 02/02/2021 13:00 JK1 7MR

(i) Identify the industry standard language that provides both DML and Data Definition
Language (DDL) statements.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2020 9608/11/O/N/20


5

(ii) Write a DDL statement to update the table APPOINTMENT and define AppointmentID
as the primary key.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) Complete the DML script to display the times and Pet IDs of all appointments on
02/02/2021 with staff ID of ‘JK1’, in descending order of time.

SELECT ........................................................ , ........................................................

FROM APPOINTMENT

WHERE ........................................................ AND ........................................................

ORDER BY Time ........................................................ ;


[3]

(d) New pet owners complete a paper-based form to register their pets at the surgery.

(i) Describe two verification checks that can be carried out when the data from the paper-
based form is entered into the database.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

© UCLES 2020 9608/11/O/N/20 [Turn over


6

(ii) Appointments can be booked between 09:00 and 16:50 on Monday to Friday.

Describe the ways in which the appointment date and time can be validated to make
sure they are reasonable.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(e) The surgery has five computers that can all access the database. A copy of the database is
stored centrally.

(i) Complete the description of this type of network model by filling in the missing terms.

The ......................................... model has one ......................................... that stores all

the data for the surgery. The other computers are ......................................... . When a

user requests data, a request is sent to the ......................................... .


[4]

(ii) The surgery wants to keep all data secure. The surgery network is not connected to the
Internet.

Identify two authentication techniques the surgery could use to restrict access to the
data.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

© UCLES 2020 9608/11/O/N/20


7

3 Ria manages a team of software developers. The team is creating a mobile application game for a
client.

Ria wants to ensure that her team works to the ACM/IEEE Software Engineering Code of Ethics.

(a) Explain the ways in which Ria and her team can ensure that they follow the Code of Ethics in
relation to the product and their colleagues.

(i) Product

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Colleagues

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(b) Ria’s client wants to sell the game for a profit. The client cannot decide which type of software
licence to use to distribute the game.

Identify two types of licence that Ria could recommend to her client and justify the use of
each licence.

Licence 1 ..................................................................................................................................

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Licence 2 ..................................................................................................................................

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2020 9608/11/O/N/20 [Turn over


8

4 The following table shows assembly language instructions for a processor that has one general
purpose register, the Accumulator (ACC).

Instruction
Explanation
Op code Operand
Direct addressing. Load the contents of the location at the given address to
LDD <address>
ACC.
LDM #n Immediate addressing. Load the denary number n to ACC.
Indirect addressing. The address to be used is at the given address. Load
LDI <address>
the contents of this second address to ACC.
CMP <address> Compare the contents of ACC with <address>.

STO <address> Store contents of ACC at the given address.

ADD <address> Add the contents of the given address to ACC.

SUB <address> Subtract the contents of the given address from the contents of ACC.

OUT Output to screen the character whose ASCII value is stored in ACC.

INC <register> Add 1 to the contents of the register (ACC or IX).

JPE <address> Following a compare instruction, jump to <address> if the compare was True.

END Return control to the operating system.

(a) The current contents of the main memory are:

Address Instruction
100 LDD 200
101 ADD 201
102 ADD 202
103 SUB 203
104 STO 204
105 END

200 10
201 20
202 5
203 6
204
205

© UCLES 2020 9608/11/O/N/20


9

Tick (✓) one box to indicate which one of the following statements is true after program
execution.

Statements Tick (✓)


Memory location 204 contains 400
Memory location 204 contains 41
Memory location 204 contains 231
Memory location 204 contains 29
[1]

(b) The current contents of the main memory are:

Address Instruction
100 LDM #120
101 ADD 121
102 SUB 122
103 STO 120
104 END

120 10
121 2
122 4
123 6
124 8
125 10

Tick (✓) one box to indicate which one of the following statements is true after program
execution.

Statement Tick (✓)


Memory location 120 contains 135

Memory location 120 contains 118

Memory location 120 contains 0

Memory location 120 contains 16


[1]

© UCLES 2020 9608/11/O/N/20 [Turn over


10

(c) The current contents of the main memory are:

Address Instruction
150 LDI 200
151 ADD 200
152 ADD 201
153 STO 205
154 END

200 202
201 203
202 201
203 200
204
205

Tick (✓) one box to indicate which one of the following statements is true after program
execution.

Statement Tick (✓)


Memory location 205 contains 607

Memory location 205 contains 601

Memory location 205 contains 603

Memory location 205 contains 606


[1]

(d) Identify two modes of addressing that are not used in parts (a), (b) or (c).

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

© UCLES 2020 9608/11/O/N/20


11

(e) Assembly language instructions can be put into groups.

Tick (✓) one box on each row to indicate the appropriate instruction group for each assembly
language instruction.

Assembly language Data Jump Input and


Arithmetic
instruction movement instruction output of data

STO 120

JPE 200

ADD 3

LDD 20

INC ACC

OUT

[3]

© UCLES 2020 9608/11/O/N/20 [Turn over


12

5 Oscar is watching a concert on his laptop computer.

(a) The concert is streamed to his computer at the same time as it is taking place.

(i) Identify whether Oscar is using real-time or on-demand bit streaming. Justify your choice.

Streaming method .............................................................................................................

Justification .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

(ii) The video of the concert repeatedly stops and restarts while Oscar is watching it on his
laptop computer. His friend is watching the same video of the concert at the same time,
in a different location, but he does not experience the same problem as Oscar.

Give three possible reasons why Oscar’s video constantly stops and starts again.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2020 9608/11/O/N/20


13

(b) The video of the concert is made up of a sound track and multiple images.

Two successive frames of one section of the video are shown. The pixel colours are
represented by letters.

BL BL BL RD RD RD BL BL BL RD RD RD

K K K K K K BL BL BL RD RD RD

LG LG LG DG DG DG LG LG LG DG DG DG

Y Y K Y Y K BK BK BK BK BK BK

W K W W W DG W K W W W DG

P P P P P P P P P P P P

Frame 1 Frame 2

(i) Explain the way in which progressive encoding can be used to transmit Frames 1 and 2.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Explain, using Frames 1 and 2 as an example, the way in which temporal redundancy
can be used to compress a video.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(iii) Give another type of redundancy technique that can be used to compress a video.

...........................................................................................................................................

..................................................................................................................................... [1]

(iv) MP4, WMV and AVI are all examples of a type of format that combines sound and image
components into a video.

Identify the type of format that combines the sound and image components into a video.

...........................................................................................................................................

..................................................................................................................................... [1]
© UCLES 2020 9608/11/O/N/20 [Turn over
14

6 (a) Convert the following denary number into a 12-bit two’s complement binary form.

-245

[1]

(b) Convert the following hexadecimal number into denary.

F0

...................................................................................................................................................

............................................................................................................................................. [1]

(c) Convert the following unsigned binary integer into denary.

10101111

...................................................................................................................................................

............................................................................................................................................. [1]

(d) Convert the following Binary Coded Decimal (BCD) into denary.

100001010011

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2020 9608/11/O/N/20


15

7 Anne is downloading a sound file from a web server. She had the choice of a sampling rate of
44.1 kHz or 98 kHz before she downloaded the sound file.

Explain the differences between the two sound files stored on the server.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

© UCLES 2020 9608/11/O/N/20 [Turn over


16

8 Joshua’s laptop is connected to the router on his home network.

(a) The laptop has a private IP address. The router has both public and private IP addresses.

Explain the reasons why Joshua’s laptop has a private IP address only, but the router has
both a private and a public IP address.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Joshua visits a website by entering its Uniform Resource Locator (URL).

Describe how the URL is converted into a matching IP address.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(c) Give one example of a valid IPv4 address.

...................................................................................................................................................

............................................................................................................................................. [1]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 9608/11/O/N/20


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level
* 1 9 3 6 5 5 4 5 5 9 *

COMPUTER SCIENCE 9608/13


Paper 1 Theory Fundamentals October/November 2019
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 14 printed pages and 2 blank pages.

DC (SC/TP) 171632/4
© UCLES 2019 [Turn over
2

1 In a supermarket, a self-checkout machine allows customers to scan the barcodes of products and
then pay for their shopping. These are an alternative to the traditional cashier-staffed checkout.

(a) The self-checkout machine has a touchscreen.

(i) Identify two other input devices that self-checkout machines have.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(ii) Identify two other output devices that self-checkout machines have.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

© UCLES 2019 9608/13/O/N/19


3

(iii) The touchscreen uses capacitive technology.

The sequence of steps 1 to 6 describes the internal operation of the touchscreen.

The statements A, B, C and D are used to complete the sequence.

A Charge is drawn to the point of contact.


B The screen has a layer that stores an electrical charge.
C There is a change in the electrostatic field.
D The coordinates are sent to the touchscreen driver.

Write one of the letters A to D in each appropriate row to complete the sequence.

1 ............................

2 When the user touches the screen

3 ............................

4 ............................

5 The coordinates of the point of contact can be calculated.

6 ............................
[2]

(b) The self-checkout machines have primary storage.

(i) Give two reasons why the self-checkout machine needs primary storage.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(ii) The self-checkout machines use Static RAM (SRAM) for their cache.

The following table has statements about SRAM or Dynamic RAM (DRAM).

Tick (✓) one box in each row to identify whether the statement is about SRAM or DRAM.

Statement SRAM DRAM


More expensive to make
Requires refreshing (recharging)
Made from flip-flops
[2]

© UCLES 2019 9608/13/O/N/19 [Turn over


4

(c) The self-checkout machines connect to a server that stores all the data for the supermarket.
This is a client-server network.

(i) Describe, using an example for the supermarket, the client-server network model.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) The supermarket is concerned about the security and integrity of the data on the server.

Identify two methods that can be used to minimise the security risk to the data, and one
method to protect the integrity of the data.

Security 1 ..........................................................................................................................

...........................................................................................................................................

Security 2 ..........................................................................................................................

...........................................................................................................................................

Integrity .............................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2019 9608/13/O/N/19


5

2 Leonardo’s mobile phone has an operating system (OS).

(a) Describe the following key management tasks that the mobile phone operating system carries
out.

Process management ...............................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Memory management ...............................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

(b) Leonardo uses the mobile phone to record his voice.

(i) Describe how sound sampling is used by the mobile phone to encode the sound.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2019 9608/13/O/N/19 [Turn over


6

(ii) Leonardo records his voice twice. Each recording is the same length and has the same
sampling resolution.

The first recording has a sampling rate of 44 100 Hz. The second recording has a
sampling rate of 21 000 Hz.

Describe how the different sampling rates will affect the recording and the sound file.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) Leonardo transfers the recordings to his laptop computer. He uses sound editing
software to delete some sections of the recordings, and copy and paste to replicate other
sections.

Describe two other features of sound editing software Leonardo can use to edit the
recordings.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

© UCLES 2019 9608/13/O/N/19


7

3 A hotel needs to record information about customers and their bookings.

(a) The hotel has two types of room: double and family. Each room has a unique room number.

The hotel stores information about the customers including their name, address and contact
details.

When a customer books a room, they give the start date and the number of nights they want
to stay. If a customer wants more than one room, each room must have a separate booking.
Each booking has an ID number.

The hotel creates a normalised, relational database to store the required information. There
are three tables:

• CUSTOMER
• ROOM
• BOOKING

(i) Complete the database design for the hotel by writing the attributes for each table.

CUSTOMER( .......................................................................................................................

...........................................................................................................................................

........................................................................................................................................ )

ROOM( ...............................................................................................................................

...........................................................................................................................................

........................................................................................................................................ )

BOOKING( .........................................................................................................................

...........................................................................................................................................

........................................................................................................................................ )
[3]

(ii) Identify the primary key for each table that you designed in part (a)(i).

CUSTOMER .........................................................................................................................

ROOM ..................................................................................................................................

BOOKING ...........................................................................................................................
[2]

© UCLES 2019 9608/13/O/N/19 [Turn over


8

(iii) Identify one foreign key in the tables that you designed in part (a)(i).

Table name ........................................................................................................................

Foreign key .......................................................................................................................


[1]

(b) The hotel wants to use a Database Management System (DBMS) to set up and manage the
database.

Describe, using examples, how the hotel can use the following DBMS tools:

Developer interface ..................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Query processor .......................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[5]

(c) The following table has four SQL scripts.

Tick (✓) one box in each row to identify whether the script is an example of a Data Definition
Language (DDL) statement or a Data Manipulation Language (DML) statement.

Script DDL DML

CREATE TABLE FILMS

SELECT FilmID FROM FILMS

ALTER TABLE FILMS ADD PRIMARY KEY (FilmID)

CREATE DATABASE MYDATA


[2]

© UCLES 2019 9608/13/O/N/19


9

4 (a) Convert the unsigned binary number 0101 1111 1100 into denary.

............................................................................................................................................. [1]

(b) Convert the denary number −239 into 12-bit two’s complement.

............................................................................................................................................. [1]

(c) Convert the two’s complement number 0110 0101 into denary.

............................................................................................................................................. [1]

(d) Convert the Binary Coded Decimal (BCD) value 0110 0101 into denary.

............................................................................................................................................. [1]

(e) Convert the denary number 222 into hexadecimal.

............................................................................................................................................. [1]

© UCLES 2019 9608/13/O/N/19 [Turn over


10

5 (a) Draw a logic circuit to represent the logic expression:

X = NOT (A OR C) OR (A AND NOT B)

B X

[5]

(b) Complete the truth table for the logic expression:

X = NOT (A OR C) OR (A AND NOT B)

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2019 9608/13/O/N/19


11

Question 6 begins on the next page.

© UCLES 2019 9608/13/O/N/19 [Turn over


12

6 Willow is creating a website.

One of the web pages includes the following JavaScript code and HTML tags.

01 <html>
02 <body>
03 <form>
04 <p id="displayQuestion"></p>
05 <input type="text" id="answer">
06 <button id="submit" onclick="checkAnswer()"> Submit </button>
07 </form>
08 </body>
09 <script>
10 val1 = Math.floor((Math.random() * 10) + 1);
11 val2 = Math.floor((Math.random() * 10) + 1);
12 document.getElementById("displayQuestion").innerHTML = "What is" +
val1.toString() + "*" + val2.toString() + "?";
13 function checkAnswer(){
14 userAnswer = document.getElementById("answer").value;
15 answer = val1 * val2
16 if (userAnswer == answer.toString()){
17 alert("Correct, well done");
18 }else{
19 alert("Sorry that's incorrect");
20 }
21 }
22 </script>
23 </html>

(a) (i) Name three functions in the JavaScript code.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

(ii) Identify every line number of the JavaScript code that generates an output.

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) Identify the line number of the JavaScript code that takes data the user has input and
stores it in a variable.

..................................................................................................................................... [1]

© UCLES 2019 9608/13/O/N/19


13

(iv) Describe the purpose of the code on line 16.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(b) Willow used functions from a JavaScript program library in the web page.

Describe the benefits to Willow of using program libraries to create the web page.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 9608/13/O/N/19 [Turn over


14

7 The following table has descriptions of modes of addressing.

Complete the table by writing the name of the addressing mode for each description.

Addressing mode Description

Form the address by adding the given number to a base address. Load
the contents of the calculated address to the Accumulator (ACC).

Load the contents of the address held at the given address to ACC.

Load the contents of the given address to ACC.

Form the address from the given address + the contents of the Index
Register. Load the contents of the calculated address to ACC.

Load the given value directly to ACC.

[5]

© UCLES 2019 9608/13/O/N/19


15

BLANK PAGE

© UCLES 2019 9608/13/O/N/19


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 9608/13/O/N/19


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level
* 5 3 3 9 7 0 9 6 4 6 *

COMPUTER SCIENCE 9608/12


Paper 1 Theory Fundamentals October/November 2019
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 14 printed pages and 2 blank pages.

DC (SC/CB) 171631/1
© UCLES 2019 [Turn over
2

1 (a) The diagram shows different types of software on the left, and descriptions on the right.

Draw a line from each type of software to its correct description.

Type of software Description

Provides a ready-built routine that can be


imported into a program

Operating system

Provides an interface between the user and


the hardware

Utility program

Converts source code into a low-level


language

Library program

Creates a new document for the user to edit

Compiler

An additional program that helps to maintain


or configure the system

[4]

(b) Describe the purpose of disk repair software.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 9608/12/O/N/19


3

2 (a) Draw a logic circuit to represent the following logic expression:

X = NOT (A AND B) AND (C XOR D)

B
X

[4]

(b) Complete the truth table for the logic expression:

X = NOT (A AND B) OR (A AND (B XOR C))

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2019 9608/12/O/N/19 [Turn over


4

3 A web page includes the following JavaScript and HTML code.

01 <html>
02 <body>
03
04 <form>
05 <p><input type="text" id="textBox1"></p>
06 <button id = "button1" onclick="multiply()">First</button>
07 <button id = "button2" onclick="addition()">Second</button>
08 </form>
09
10 </body>
11 <script>
12 function multiply(){
13 value1 = document.getElementById("textBox1").value;
14 value1++;
15 alert(parseInt(value1)* parseInt(value1));
16 }
17
18 function addition(){
19 value1 = document.getElementById("textBox1").value;
20 alert(parseInt(value1) + parseInt(value1));
21 }
22 </script>
23 </html>

(a) Name two identifiers used in the JavaScript code.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) The number 9 is typed into textBox1.

Write the value that is output after button1 is pressed.

............................................................................................................................................. [1]

(c) State the purpose of the code in line 14.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2019 9608/12/O/N/19


5

(d) Line 20 is replaced with:

20 alert(value1 + value1);

Describe how this will affect the program.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 9608/12/O/N/19 [Turn over


6

4 Anushka needs to store information about bookings at a sports club.

(a) Anushka has a file-based storage system. She wants a relational database.

(i) Describe the features of a relational database that address the limitations of Anushka’s
file-based system.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) The relational database design needs to be normalised. The following statements
describe the three stages of database normalisation.

Complete the statements by filling in the missing words.

For a database to be in First Normal Form (1NF) there must be no ..................................

groups of attributes.

For a database to be in Second Normal Form (2NF), it must be in 1NF, and contain no

.................................. key dependencies.

For a database to be in Third Normal Form (3NF), it must be in 2NF, and all attributes

must be fully dependent on the .................................. .................................. .


[4]

© UCLES 2019 9608/12/O/N/19


7

(b) The normalised relational database, SPORTS_CLUB, has the following table design.

MEMBER(MemberID, FirstName, LastName, MembershipType)

SESSION(SessionID, Description, SessionDate, SessionTime, NumberMembers)

TRAINER(TrainerID, TrainerFirstName, TrainerLastName)

MEMBER_SESSION(MemberID, SessionID)

SESSION_TRAINER(SessionID, TrainerID)

(i) Anushka has designed an entity-relationship (E-R) diagram for SPORTS_CLUB.

Complete the entity-relationship (E-R) diagram.

MEMBER SESSION

MEMBER_SESSION SESSION_TRAINER

TRAINER

[2]

(ii) Anushka first needs to create the database that she has designed.

Write a Data Definition Language (DDL) statement to create the SPORTS_CLUB


database.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2019 9608/12/O/N/19 [Turn over


8

(iii) The table shows some sample data for the table SESSION.

SessionID Description SessionDate SessionTime NumberMembers


21PL Pilates junior 04/04/2020 18:00 15
13AE Aerobics senior 04/04/2020 19:00 20
Weightlifting
33WG 04/04/2020 10:00 10
advanced

Write a DDL script to create the table SESSION.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

(iv) Write a Data Manipulation Language (DML) script to return the first name and last name
of all members who have Peak membership type.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

© UCLES 2019 9608/12/O/N/19


9

5 Mica has created some software and has copyrighted it. She wants to stop other people from
copying and changing it illegally.

(a) Identify two ways Mica can prevent illegal copies of the software being installed.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Identify one way Mica can distribute the software without the source code.

...................................................................................................................................................

............................................................................................................................................. [1]

(c) Mica is releasing the software under a commercial licence.

(i) Give two benefits to Mica of using a commercial licence.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(ii) Name two other types of software licence.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2019 9608/12/O/N/19 [Turn over


10

6 Dominic uses a tablet computer to complete work. He records videos of his work to send to his
colleagues to watch at a later date.

(a) The tablet computer has input and output devices.

(i) The table lists four devices built into the tablet.

Tick (✓) one or more boxes for each device to identify whether it is an input device, an
output device or both.

Device Input Output

Touchscreen

Webcam

Microphone

Fingerprint scanner
[2]

© UCLES 2019 9608/12/O/N/19


11

(ii) An external speaker is plugged into the tablet computer.

The sequence of steps 1 to 7 describes the internal operation of the speaker.

The statements A, B, C, D and E are used to complete the sequence.

Letter Statement

Changes in the audio signal cause the direction of the electrical current to change.
A
This determines the polarity of the electromagnet.

B The vibration creates sound waves.

C An electric current is sent to the speaker.

D The electromagnet is repelled by, or attracted to the permanent magnet.

E The electric current passes through the coil.

Write one of the letters A to E in each appropriate row to complete the sequence.

1 ............................

2 ............................

3 The current in the coil creates an electromagnetic field.

4 ............................

5 ............................

6 The movement of the coil causes the diaphragm to vibrate.

7 ............................
[4]

© UCLES 2019 9608/12/O/N/19 [Turn over


12

(b) The tablet computer’s secondary storage is solid state (flash) memory.

(i) Give one reason why the tablet computer needs secondary storage.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Describe solid state memory.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(c) The tablet computer has RAM and ROM memory.

State the purpose of RAM and ROM memory in the computer.

RAM ..........................................................................................................................................

...................................................................................................................................................

ROM .........................................................................................................................................

...................................................................................................................................................
[2]

(d) Dominic’s tablet captures a video of Dominic to send to other people. The video is made of a
sequence of images and a sound file.

(i) Describe how the images and sound are encoded into a digital form.

Images ..............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Sound ................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]
© UCLES 2019 9608/12/O/N/19
13

(ii) The sequence of images and the sound file create a video. This is sent over the Internet
as a video stream. The video stream can use interlaced encoding or progressive
encoding.

Describe the terms interlaced encoding and progressive encoding.

Interlaced encoding ...........................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Progressive encoding ........................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

(e) Dominic sends his videos to his colleagues over the Internet using bit streaming.

(i) Describe how the video is sent using bit streaming.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) Circle either Real-time or on-demand to identify whether the video will be sent using
real-time or on-demand bit streaming. Justify your choice.

Real-time / on-demand

Justification .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[2]
© UCLES 2019 9608/12/O/N/19 [Turn over
14

(iii) Describe the following video terms.

Temporal redundancy ........................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Spatial redundancy ...........................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2019 9608/12/O/N/19


15

BLANK PAGE

© UCLES 2019 9608/12/O/N/19


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 9608/12/O/N/19


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level
* 4 6 2 6 0 5 7 6 4 3 *

COMPUTER SCIENCE 9608/11


Paper 1 Theory Fundamentals October/November 2019
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 14 printed pages and 2 blank pages.

DC (LEG/CB) 171630/4
© UCLES 2019 [Turn over
2

1 Von Neumann is an example of a computer architecture.

(a) The diagram has registers used in Von Neumann architecture on the left and descriptions on
the right.

Draw one line to match each register with its correct description.

Register Description

Stores the data that has just been read from


memory, or is about to be written to memory
Current Instruction Register

Stores the instruction that is being decoded


and executed

Memory Address Register

Stores the address of the input device from


which the processor accesses the instruction

Program Counter
Stores the address of the next instruction to
be read

Memory Data Register


Stores the address of the memory location
about to be written to or read from

[4]

© UCLES 2019 9608/11/O/N/19


3

(b) Many components of the computer system transfer data between them using buses. One
example of a bus is an address bus.

(i) Name two other buses that exist within a computer and give the purpose of each.

Bus 1 .................................................................................................................................

Purpose .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Bus 2 .................................................................................................................................

Purpose .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

(ii) State the benefit of increasing the address bus width from 16 bits to 32 bits.

...........................................................................................................................................

..................................................................................................................................... [1]

(c) The following statements describe features of a low-level language.

Complete the statements by writing the appropriate terms in the spaces.

A ........................................................... is a sequence of instructions that are given an

identifier. These instructions may need to be executed several times.

A ........................................................... is an instruction that tells the assembler to do

something. It is not a program instruction.

The processor’s instruction set can be put into several groups. One of these groups is

........................................................... .
[3]

© UCLES 2019 9608/11/O/N/19 [Turn over


4

2 Aaron uses a desktop computer to do school work.

(a) Aaron has a mouse and keyboard that he can use as input devices and a monitor as an
output device.

(i) Identify two additional input devices Aaron could use with his desktop computer.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(ii) Identify two additional output devices Aaron could use with his desktop computer.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(iii) Aaron needs to store a large number of applications and data on his computer. He needs
at least 50GB of secondary storage space.

Identify one internal secondary storage device for Aaron’s computer.

...........................................................................................................................................

..................................................................................................................................... [1]

(iv) Describe the internal operation of a trackerball mouse.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

© UCLES 2019 9608/11/O/N/19


5

(b) Aaron’s computer has an operating system (OS). The OS manages the running processes
and provides a user interface.

Describe these OS management tasks.

Process management ...............................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Provision of a user interface .....................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

(c) Aaron’s computer has a virus checker and backup software.

Describe these utility programs.

Virus checker ............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Backup software .......................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2019 9608/11/O/N/19 [Turn over


6

(d) Aaron creates a web page using JavaScript code and HTML tags.

Describe how the JavaScript code is translated using an interpreter.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 9608/11/O/N/19


7

3 (a) A bank approves a customer for an account based on the criteria in the following table.

Parameter Description of parameter Binary value Condition

1 True
A Employed
0 False
1 True
B Self-employed
0 False
1 True
C Over 21
0 False
1 True
D Earn more than 30 000
0 False
1 True
E Another account
0 False

A customer is approved (X = 1) if the person:

• is over 21 and employed


or
• is over 21 and self-employed and

• either earns more than 30 000


or
• has another account.

Draw a logic circuit to represent the model.

C X

[5]

© UCLES 2019 9608/11/O/N/19 [Turn over


8

(b) Complete the truth table for the logic expression:

X = (A AND C) OR (NOT A AND (B XOR C))

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2019 9608/11/O/N/19


9

4 Customers of a bank can access their account information by logging in on the bank’s website.

(a) The bank has a client-server model of networked computers.

(i) Describe, using the bank as an example, the key features of a client-server model.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) Give two other examples of applications that can use the client-server model.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(b) The bank’s customers log in to the website using a web application.

Explain why the web application uses server-side scripting.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 9608/11/O/N/19 [Turn over


10

(c) The bank is upgrading its local area network (LAN) copper cables to fibre-optic cables.

(i) State two benefits to the bank of upgrading to fibre-optic cable from copper cable.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(ii) State two drawbacks of upgrading to fibre-optic cables.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2019 9608/11/O/N/19


11

(d) The bank uses a relational database, ACCOUNTS, to store the information about customers
and their accounts.

The database stores the customer’s first name, last name and date of birth.

The bank has several different types of account. Each account type has a unique ID number,
name (for example, regular or saving) and bonus (for example, $5.00, $10.00 or $15.00).

A customer can have more than one account.

Each customer’s account has its own ID number and stores the amount of money the
customer has in that account.

The bank creates a normalised, relational database to store the required information. There
are three tables:

• CUSTOMER
• ACCOUNT_TYPE
• CUSTOMER_ACCOUNT

(i) Write the attributes for each table to complete the database design for the bank.

CUSTOMER( .......................................................................................................................

...........................................................................................................................................

.........................................................................................................................................)

ACCOUNT_TYPE( ..............................................................................................................

...........................................................................................................................................

.........................................................................................................................................)

CUSTOMER_ACCOUNT( ......................................................................................................

...........................................................................................................................................

.........................................................................................................................................)
[3]

(ii) Identify the primary key for each table that you designed in part (d)(i).

CUSTOMER .........................................................................................................................

ACCOUNT_TYPE ................................................................................................................

CUSTOMER_ACCOUNT ........................................................................................................
[2]

(iii) Identify one foreign key in one of the tables that you designed in part (d)(i).

Table name ........................................................................................................................

Foreign key .......................................................................................................................


[1]
© UCLES 2019 9608/11/O/N/19 [Turn over
12

(iv) The following table has definitions of database terms.

Write the correct database term in the table for each definition.

Definition Term

All the data about one entity

The data in one row of a table

A column or field in a table


[3]

© UCLES 2019 9608/11/O/N/19


13

5 (a) The bit depth of an image dictates how many different colours can be represented by each
pixel.

(i) State the number of different colours that can be represented by a bit depth of 8 bits.

..................................................................................................................................... [1]

(ii) One binary colour is represented by 0100 1110

Convert the unsigned binary number 0100 1110 into denary.

..................................................................................................................................... [1]

(b) Convert the denary number −194 into 12-bit two’s complement.

............................................................................................................................................. [1]

(c) (i) Convert the Binary Coded Decimal (BCD) value 0110 1001 into denary.

..................................................................................................................................... [1]

(ii) Identify one practical application where BCD is used.

...........................................................................................................................................

..................................................................................................................................... [1]

(d) One example of a character set used by computers is ASCII.

Describe how one character is represented in a character set.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 9608/11/O/N/19 [Turn over


14

(e) Data can be compressed using either lossy or lossless compression.

Tick (✓) one box in each scenario to identify whether lossy or lossless compression should
be used. Justify your choice.

(i) A program written in a high-level language.

Lossy Lossless

Justification .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) A photograph that needs to be emailed to a friend.

Lossy Lossless

Justification .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) You need to upload a video that you have created to a website.

Lossy Lossless

Justification .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2019 9608/11/O/N/19


15

BLANK PAGE

© UCLES 2019 9608/11/O/N/19


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 9608/11/O/N/19


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level
* 1 3 8 9 7 7 8 0 4 2 *

COMPUTER SCIENCE 9608/13


Paper 1 Theory Fundamentals May/June 2019
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 14 printed pages and 2 blank pages.

DC (SC) 163550/3
© UCLES 2019 [Turn over
2

1 A computer has an operating system (OS) and utility software.

(a) The following table lists key management tasks performed by an operating system and
their descriptions.

Complete the table by writing the missing management task names and descriptions.

Management task Description

Memory management

Provides user accounts and passwords

Handles the signals sent when the attention of the processor is


required elsewhere

Provision of a software
platform

[4]

(b) A hard disk formatter and a hard disk defragmenter are two examples of utility software.

(i) Describe the actions performed by a hard disk formatter and a hard disk defragmenter.

Hard disk formatter ............................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Hard disk defragmenter .....................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

© UCLES 2019 9608/13/M/J/19


3

(ii) Identify three other examples of utility software that can be installed on the computer.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2019 9608/13/M/J/19 [Turn over


4

2 Frankie is a software developer. He is developing a program to manage customer records for a


client with an online retail business. He must ensure that data stored about each customer are
both secure and private.

(a) State the difference between security and privacy.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Computer systems can be protected by physical methods such as locks.

Describe two non-physical methods used to improve the security of computer systems.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2019 9608/13/M/J/19


5

(c) A computer uses parity blocks to check the data that has been received is the same as the
data that has been transmitted.

The following is an example of a parity block.

Parity
Data
bit
1 1 1 1 0 0 0 1
0 0 0 0 1 1 1 0
1 1 0 1 1 0 0 1
Parity
1 1 0 1 1 0 0 1
byte

(i) Describe how a parity block check can identify a bit that has been corrupted during
transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) Give a situation where a parity block check cannot identify corrupted bits.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2019 9608/13/M/J/19 [Turn over


6

(d) One principle of the ACM/IEEE Software Engineering Code of Ethics is to always act in the
best interest of the client.

Explain how Frankie can ensure that he is acting in the best interest of his client.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(e) When the program is complete, Frankie uses a compiler to prepare the program for the client.

Explain why Frankie uses a compiler instead of an interpreter.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 9608/13/M/J/19


7

3 A company uses a relational database, EMPLOYEES, to store data about its employees and
departments.

(a) The company uses a Database Management System (DBMS).

(i) The DBMS has a data dictionary.

Describe what the data dictionary stores.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) The DBMS has a query processor.

Describe the purpose of a query processor.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(b) Relationships are created between tables using primary and foreign keys.

Describe the role of a primary and a foreign key in database relationships.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 9608/13/M/J/19 [Turn over


8

(c) In the company:

• An employee can be a manager.


• A department can have several managers and several employees.
• An employee can only belong to one department.

The EMPLOYEES database has three tables:

EMPLOYEE_DATA(EmployeeID, FirstName, LastName, DateOfBirth, Gender,


DepartmentNumber)
DEPARTMENT(DepartmentNumber, DepartmentName)
DEPARTMENT_MANAGER(DepartmentNumber, EmployeeID, role)

Complete the entity-relationship (E-R) diagram for the EMPLOYEES database.

EMPLOYEE_DATA

DEPARTMENT_MANAGER DEPARTMENT

[3]

(d) Give three reasons why the EMPLOYEES database is fully normalised.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2019 9608/13/M/J/19


9

(e) Part of the EMPLOYEE_DATA table is shown.

EmployeeID FirstName LastName DateOfBirth Gender DepartmentNumber


156FJEK Harvey Kim 12/05/1984 Male S1
558RRKL Catriona Moore 03/03/1978 Female F2
388LMDV Oscar Ciao 01/01/1987 Male F2

(i) Write a Data Definition Language (DDL) statement to create the EMPLOYEES database.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Write a DDL statement to define the table EMPLOYEE_DATA, and declare EmployeeID
as the primary key.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

© UCLES 2019 9608/13/M/J/19 [Turn over


10

(iii) Write a Data Manipulation Language (DML) statement to return the first name and last
name of all female employees in the department named Finance.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

© UCLES 2019 9608/13/M/J/19


11

4 A program is written in assembly language.

(a) The op codes LDM and LDD are used to load a register. The op code LDM uses immediate
addressing, and the op code LDD uses direct addressing.

Describe what happens when the following instructions are run.

LDM #300

...................................................................................................................................................

...................................................................................................................................................

LDD 300

...................................................................................................................................................

...................................................................................................................................................
[2]

(b) Assembly language instructions can be grouped by their purpose.

The following table shows four assembly language instructions.

Tick (✓) one box in each row to indicate the group each instruction belongs to.

Jump Arithmetic Data


Instruction Description
instruction operation movement
LDR #3 Load the number 3 to the
Index Register
ADD #2 Add 2 to the Accumulator

JPN 22 Move to the instruction at


address 22
DEC ACC Subtract 1 from the
Accumulator
[3]

© UCLES 2019 9608/13/M/J/19 [Turn over


12

(c) The processor handles interrupts within the fetch-execute cycle.

(i) Give one example of a hardware interrupt and one example of a software interrupt.

Hardware ...........................................................................................................................

...........................................................................................................................................

Software ............................................................................................................................

...........................................................................................................................................
[2]

(ii) Explain how the processor handles an interrupt.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

© UCLES 2019 9608/13/M/J/19


13

5 Xander creates a presentation that includes images, video and sound.

(a) The images are bitmap images. A bitmap image can be made up of any number of colours.
Each colour is represented by a unique binary number.

Draw one line from each box on the left, to the correct box on the right to identify the minimum
number of bits needed to store each maximum number of colours.

Maximum number of colours Minimum number of bits

1
68

2
256

127

2
8

249
9

[3]

© UCLES 2019 9608/13/M/J/19 [Turn over


14

(b) One of the videos has a frame rate of 40 fps (frames per second).

(i) State what is meant by 40 fps.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) One video uses interlaced encoding, and a second video uses progressive encoding.

Describe two differences between interlaced and progressive encoding.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

(c) The sound track has a sampling rate of 88.2 kHz and a sampling resolution of 32 bits.

State what is meant by a sampling rate of 88.2 kHz and a sampling resolution of 32 bits.

Sampling rate of 88.2 kHz .........................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Sampling resolution of 32 bits ..................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2019 9608/13/M/J/19


15

BLANK PAGE

© UCLES 2019 9608/13/M/J/19


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 9608/13/M/J/19


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level
* 0 2 5 0 7 8 0 7 6 8 *

COMPUTER SCIENCE 9608/12


Paper 1 Theory Fundamentals May/June 2019
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 13 printed pages and 3 blank pages.

DC (SC) 163549/4
© UCLES 2019 [Turn over
2

1 Computers on the Internet have IP addresses.

(a) IP addresses can be in either IPv4 or IPv6 format.

(i) Give an example of a valid IPv4 address.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) State why there is a need for IPv6 addressing.

...........................................................................................................................................

..................................................................................................................................... [1]

(iii) A computer’s IPv6 address is:

C100:2235::1000:25AA:AA50
Explain why this IPv6 address would be an invalid IPv4 address.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(b) A company has computers in two separate buildings that communicate using the Internet
over a Public Switched Telephone Network (PSTN).

(i) Describe the transmission of data using a PSTN.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) The company wants to install a dedicated line between the two buildings.

Identify one benefit and one drawback of installing a dedicated line between the two
buildings.

Benefit ...............................................................................................................................

...........................................................................................................................................

Drawback ..........................................................................................................................

...........................................................................................................................................
[2]
© UCLES 2019 9608/12/M/J/19
3

(c) A network can use routers and gateways.

Explain the role of routers and gateways in a network.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(d) The company has an email server.

Identify three other types of server.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2019 9608/12/M/J/19 [Turn over


4

2 Biyu is writing a computer program in a high-level language.

(a) Biyu uses a language translator.

(i) State the purpose of a language translator.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Biyu uses an interpreter.

State two benefits of Biyu using an interpreter instead of a compiler while writing the
program.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(iii) Name a translator other than an interpreter and a compiler.

..................................................................................................................................... [1]

(b) Biyu uses library files in the program.

Explain why software is often developed using library files.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 9608/12/M/J/19


5

3 The fetch-execute cycle is shown in register transfer notation.

01 MAR [PC]

02 PC [PC] - 1

03 MDR [MAR]

04 CIR [MAR]

(a) There are three errors in the fetch-execute cycle shown.

Identify the line number of each error and give the correction.

Line number ..............................................................................................................................

Correction .................................................................................................................................

Line number ..............................................................................................................................

Correction .................................................................................................................................

Line number ..............................................................................................................................

Correction .................................................................................................................................
[3]

(b) A processor’s instruction set can be grouped according to their function. For example, one
group is the input and output of data.

Identify two other groups of instructions.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2019 9608/12/M/J/19 [Turn over


6

(c) The following table shows assembly language instructions for a processor which has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).

Instruction
Explanation
Op code Operand
LDM #n Immediate addressing. Load the denary number n to ACC
Direct addressing. Load the contents of the location at the given address to
LDD <address>
ACC
Indexed addressing. Form the address from <address> + the contents of the
LDX <address>
Index Register. Copy the contents of this calculated address to ACC
LDR #n Immediate addressing. Load the denary number n to IX
STO <address> Store contents of ACC at the given address
ADD <address> Add the contents of the given address to ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP #n Compare contents of ACC with denary number n
JPE <address> Following a compare instruction, jump to <address> if the compare was True
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
OUT Output to the screen the character whose ASCII value is stored in ACC
END Return control to the operating system

The current contents of the main memory, Index Register (IX) and selected values from the
ASCII character set are:

Address Instruction ASCII code table (Selected codes only)


50 LDM #0 ASCII code Character
51 STO 401
65 A
52 LDX 300
66 B
53 CMP #0
54 JPE 62 67 C
55 ADD 400 68 D
56 OUT 69 E
57 LDD 401
58 INC ACC
59 STO 401
60 INC IX
61 JMP 52
62 END

300 2
301 5
302 0
303 4

400 64
401

IX 0
© UCLES 2019 9608/12/M/J/19
7

Trace the program currently in memory using the following trace table.
The first instruction has been completed for you.

Instruction Memory address


ACC IX OUTPUT
address 300 301 302 303 400 401

2 5 0 4 64 0

50 0

[8]

© UCLES 2019 9608/12/M/J/19 [Turn over


8

(d) The ASCII character code for ‘A’ is 65 in denary.

(i) Convert the denary ASCII character code for ‘A’ into 8-bit binary.

[1]

(ii) Convert the denary ASCII character code for ‘A’ into hexadecimal.

..................................................................................................................................... [1]

(iii) The Unicode character code for ‘G’ is 0047 in hexadecimal.

State, in hexadecimal, the Unicode character code for ‘D’.

..................................................................................................................................... [1]

© UCLES 2019 9608/12/M/J/19


9

4 Shazia is creating a computer program that will be released to the public. The program includes a
video.

(a) Shazia uses a microphone to record a sound track for the video.

(i) Describe the internal operation of a microphone.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) The script for the sound track is printed using a laser printer.

Describe the internal operation of a laser printer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(b) The video is recorded using progressive encoding.

Describe progressive encoding.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 9608/12/M/J/19 [Turn over


10

(c) Shazia’s computer has Dynamic RAM (DRAM) and Static RAM (SRAM).

Explain the differences between Dynamic RAM and Static RAM.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(d) Shazia wants to make sure her computer program is copyrighted.

(i) Define the term copyright.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Shazia does not want to release the software as open source.

Explain why Shazia does not want to use an open source licence.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) Name and describe two software licences, other than open source that Shazia could
use.

Licence 1 ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Licence 2 ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2019 9608/12/M/J/19


11

5 Moheem is creating a relational database to store data about his customers.

(a) Moheem has been told a relational database addresses some of the limitations of a file-based
approach by reducing data redundancy.

(i) State what is meant by the term data redundancy.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Explain how a relational database can help to reduce data redundancy.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(b) Moheem uses a Database Management System (DBMS) to ensure the security and integrity
of the data.

(i) Explain the difference between security and integrity.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Name and describe two security features provided by a DBMS.

Feature 1 ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Feature 2 ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]
© UCLES 2019 9608/12/M/J/19 [Turn over
12

(iii) The DBMS provides software tools for the database developer.

Fill in the names of the missing software tools in the following statements.

A ..................................................................... allows a developer to extract data from a


database.

A ..................................................................... enables a developer to create user-friendly


forms and reports.
[2]

© UCLES 2019 9608/12/M/J/19


13

6 (a) Draw a logic circuit to represent the logic expression:

X = A OR (B AND NOT C) OR (A AND B)

B X

[5]

(b) Complete the truth table for the logic expression in part (a).

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2019 9608/12/M/J/19


14

BLANK PAGE

© UCLES 2019 9608/12/M/J/19


15

BLANK PAGE

© UCLES 2019 9608/12/M/J/19


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 9608/12/M/J/19


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level
* 1 0 3 1 1 0 2 9 2 8 *

COMPUTER SCIENCE 9608/11


Paper 1 Theory Fundamentals May/June 2019
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 13 printed pages and 3 blank pages.

DC (SC) 163548/3
© UCLES 2019 [Turn over
2

1 Devices connected to the Internet have IP (Internet Protocol) addresses.

(a) Three IPv4 addresses are given.

Circle either Valid or Invalid to indicate whether each address is valid or invalid. Explain your
decision.

Address 1: 3A.21.2H.1 Valid / Invalid

Explanation ...............................................................................................................................

...................................................................................................................................................

Address 2: 299.53.2.2 Valid / Invalid

Explanation ...............................................................................................................................

...................................................................................................................................................

Address 3: 192.2.1.0 Valid / Invalid

Explanation ...............................................................................................................................

...................................................................................................................................................
[3]

(b) A website can be accessed using either the Uniform Resource Locator (URL) or the IP
address.

Describe how a URL is converted into its matching IP address.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(c) People use the Internet to stream media.

Complete the following statements by filling in the names of the missing methods of bit
streaming.

................................................. bit streaming is used when watching a live stream of events


that are currently taking place. The event is captured live with a video camera connected to a
computer, and it cannot be paused or rewound.

................................................. bit streaming is used when watching an event that has taken
place in the past. Existing media are encoded to bit streaming format and uploaded to a
server. It can be paused and rewound.
[2]
© UCLES 2019 9608/11/M/J/19
3

(d) A recording of a concert is stored as a file. The file is compressed using lossy compression
before it is streamed to users.

(i) State why this file needs to be compressed.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Define the term lossy compression.

...........................................................................................................................................

..................................................................................................................................... [1]

(iii) The file could be compressed using lossless compression.

Explain why lossy compression is a more appropriate compression technique than


lossless for this file.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

© UCLES 2019 9608/11/M/J/19 [Turn over


4

2 A software company produces software and distributes it under different software licences.

(a) Four descriptions of software licences are given.

Write the type of software licence that best fits each description. Use a different type of licence
for each description.

1. The software can be legally used, only after a fee has been paid.

Licence type .............................................................................................................................

2. The source code comes with the software. If the software is modified, the edited source
code must be released under the same conditions as the original software.

Licence type .............................................................................................................................

3. The software is free for a trial period and then a fee is requested, or expected, if the user
wants to continue to use the software.

Licence type .............................................................................................................................

4. The source code comes with the software. The software is free to be downloaded, edited,
and distributed, possibly without restriction.

Licence type .............................................................................................................................


[4]

(b) The software company stores information about customers and the software licences they
have purchased. The company considers a file-based approach for the storage and retrieval
of data.

(i) Give three limitations of a file-based approach to store the data.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2019 9608/11/M/J/19


5

(ii) The software company decides to use a database to overcome the limitations of a
file-based system. Some of these limitations are addressed through the logical schema.

Name and describe two levels of the schema of a database.

Name 1 ..............................................................................................................................

Description ........................................................................................................................

...........................................................................................................................................

Name 2 ..............................................................................................................................

Description ........................................................................................................................

...........................................................................................................................................
[4]

© UCLES 2019 9608/11/M/J/19 [Turn over


6

(c) The database has the following tables:

CUSTOMER(CustomerID, CompanyName)

SOFTWARE(SoftwareID, SoftwareName, OperatingSystem, Description)

LICENCE(LicenceID, CustomerID, SoftwareID, DateOfPurchase,


LicenceType, Cost, ExpiryDate)

(i) Identify the type of relationship that exists between the tables CUSTOMER and LICENCE.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Describe how the relationship is created between the tables CUSTOMER and LICENCE.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) The company needs a list of all software licences that have an expiry date on or before
31/12/2019.

Write an SQL query to return the fields CustomerID, SoftwareID, LicenceType,


Cost and ExpiryDate for all licences that expire on, or before 31/12/2019. Group the
output by CustomerID, and in ascending order of cost.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

© UCLES 2019 9608/11/M/J/19


7

3 Kimmy has written a program in a high-level language.

(a) Kimmy has used library routines in the program.

(i) Describe two advantages of using library routines in the program.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

(ii) Describe what is meant by a Dynamic Link Library (DLL).

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(b) Three translators are compilers, interpreters, and assemblers.

(i) State one benefit of Kimmy using an interpreter during the development of the program.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) State three benefits of Kimmy using a compiler when the program is complete.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2019 9608/11/M/J/19 [Turn over


8

4 A software developer works in a team for a large software development company.

(a) Two principles of the ACM/IEEE Software Engineering Code of Ethics are:

• developers must act consistently with the public interest


• developers must act in the best interest of their client and employer.

Name and describe three other principles in the ACM/IEEE Software Engineering Code of
Ethics.

Principle 1 .................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Principle 2 .................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Principle 3 .................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

(b) The software development company uses data backup and disk-mirroring to keep their data
secure.

Explain how data backup and disk-mirroring allow the company to recover from data loss.

Data backup .............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Disk-mirroring ...........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]
© UCLES 2019 9608/11/M/J/19
9

5 A simple program written in assembly language is translated using a two-pass assembler.

(a) The table contains some of the tasks performed by a two-pass assembler.

Tick (✓) one box in each row to indicate whether the task is performed at the first or second
pass. The first row has been completed for you.

Task First pass Second pass


Creation of symbol table ✓
Expansion of macros
Generation of object code
Removal of comments
[2]

(b) The processor’s instruction set can be grouped according to their function. For example, one
group is modes of addressing.

Identify two other groups of instructions.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2019 9608/11/M/J/19 [Turn over


10

(c) The table shows assembly language instructions for a processor which has one general
purpose register, the Accumulator (ACC), and an Index Register (IX).

Instruction
Explanation
Op code Operand
LDM #n Immediate addressing. Load the denary number n to ACC.
Direct addressing. Load the contents of the location at the given address to
LDD <address>
ACC.
Indexed addressing. Form the address from <address> + the contents of the
LDX <address>
Index Register. Copy the contents of this calculated address to ACC.
LDR #n Immediate addressing. Load the denary number n to IX.
STO <address> Store contents of ACC at the given address.
ADD <address> Add the contents of the given address to ACC.
INC <register> Add 1 to the contents of the register (ACC or IX).
CMP #n Compare contents of ACC with denary number n.
JPE <address> Following a compare instruction, jump to <address> if the compare was True.
JPN <address> Following a compare instruction, jump to <address> if the compare was False.
JMP <address> Jump to the given address.
OUT Output to screen the character whose ASCII value is stored in ACC.
END Return control to the operating system.

The current contents of the main memory, Index Register (IX) and selected values from the
ASCII character set are:

Address Instruction ASCII code table (Selected codes only)


20 LDM #0 ASCII Code Character
21 STO 300
22 CMP #0 65 A
23 JPE 28 66 B
24 LDX 100 67 C
25 ADD 301
26 OUT 68 D
27 JMP 30 69 E
28 LDX 100 97 a
29 OUT
30 LDD 300 98 b
31 INC ACC 99 c
32 STO 300 100 d
33 INC IX
101 e
34 CMP #2
35 JPN 22
36 END

100 65
101 67
102 69
103 69
104 68

300
301 33

IX 0
© UCLES 2019 9608/11/M/J/19
11

Trace the program currently in memory using the following trace table. The first instruction
has been completed for you.

Instruction Memory address


ACC IX OUTPUT
address 100 101 102 103 104 300 301

65 67 69 69 68 33 0

20 0

[8]

© UCLES 2019 9608/11/M/J/19 [Turn over


12

6 A student records a video using a digital camera.

(a) The recording uses interlaced encoding.

Describe interlaced encoding.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) State one benefit of using interlaced encoding compared to progressive encoding.

...................................................................................................................................................

............................................................................................................................................. [1]

(c) A video can be compressed using spatial redundancy or temporal redundancy.

Explain how temporal redundancy compresses a video.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(d) A sound track is recorded for the video.

(i) Describe how a computer encodes the sound track.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

© UCLES 2019 9608/11/M/J/19


13

(ii) Explain how the sampling rate and sampling resolution affect the file size of the sound
track.

Sampling rate ....................................................................................................................

...........................................................................................................................................

Sampling resolution ...........................................................................................................

...........................................................................................................................................
[2]

© UCLES 2019 9608/11/M/J/19


14

BLANK PAGE

© UCLES 2019 9608/11/M/J/19


15

BLANK PAGE

© UCLES 2019 9608/11/M/J/19


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 9608/11/M/J/19


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 3 4 1 3 6 3 1 8 8 5 *

COMPUTER SCIENCE 9608/13


Paper 1 Theory Fundamentals October/November 2018
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 14 printed pages and 2 blank pages.

DC (SC/SW) 144491/4
© UCLES 2018 [Turn over
2

1 A product designer is creating a poster.

(a) The designer creates a 6-colour bitmap image for the poster as shown.

Each colour is represented by a letter, for example, R = red, B = blue.

R R P P P G

B R R P G G

B W B B O O

B W W P P O

B B R P G O

B R R P G O

(i) State the minimum number of bits needed to represent each pixel in the image in part (a).

.......................................................................................................................................[1]

(ii) Calculate the minimum file size of the image shown in part (a). Show your working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

File size .............................................................................................................................


[3]

(b) (i) The designer takes a photograph to put on the poster. The photograph has a resolution of
50 000 pixels by 50 000 pixels. The colours are represented using 4 bytes per pixel.

Estimate the file size of the photograph in gigabytes. Show your working.

Working ..............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Estimated file size ..............................................................................................................


[4]

© UCLES 2018 9608/13/O/N/18


3

(ii) The photograph needs to be sent by email but the file size is too big. It needs to be
compressed.

The table lists several methods of making an image file size smaller.

Tick (✓) one box on each row to indicate whether each method is lossy or lossless.

Compression method Lossy Lossless

Cropping the image

Reducing the resolution of the image

Using run-length encoding (RLE)

Reducing the colour depth of the image

[4]

(c) Explain how run-length encoding would compress the image in part (a).

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2018 9608/13/O/N/18 [Turn over


4

2 The following table shows assembly language instructions for a processor which has one general
purpose register, the Accumulator (ACC) and an Index Register (IX).

Instruction
Explanation
Op code Operand
Direct addressing. Load the contents of the location at the given address
LDD <address>
to ACC.
Indexed addressing. Form the address from <address> + the contents of
LDX <address>
the Index Register. Copy the contents of this calculated address to ACC.
LDR #n Immediate addressing. Load the number n to IX.
STO <address> Store contents of ACC at the given address.
ADD <address> Add the contents of the given address to ACC.
INC <register> Add 1 to the contents of the register (ACC or IX).
DEC <register> Subtract 1 from the contents of the register (ACC or IX).
CMP <address> Compare contents of ACC with contents of <address>.
Following compare instruction, jump to <address> if the compare was
JPE <address>
True.
Following compare instruction, jump to <address> if the compare was
JPN <address>
False.
JMP <address> Jump to the given address.
OUT Output to the screen the character whose ASCII value is stored in ACC.
END Return control to the operating system.

(a) State what is meant by relative addressing and indexed addressing.

Relative addressing ...................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Indexed addressing ...................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2018 9608/13/O/N/18


5

(b) The current contents of a general purpose register (X) are:

X 1 1 1 1 0 0 1 0

(i) The contents of X represent an unsigned binary integer.

Convert the value in X into denary.

.......................................................................................................................................[1]

(ii) The contents of X represent an unsigned binary integer.

Convert the value in X into hexadecimal.

.......................................................................................................................................[1]

(iii) The contents of X represent a two’s complement binary integer.

Convert the value in X into denary.

.......................................................................................................................................[1]

(iv) Show the result on the general purpose register (X) after the following instruction is run.

INC X

[1]

© UCLES 2018 9608/13/O/N/18 [Turn over


6

(c) The current contents of the main memory, Index Register (IX) and selected values from the
ASCII character set are provided with a copy of the instruction set.

Address Instruction ASCII code table (selected codes only)


20 LDD 96 ASCII code Character
21 CMP 97 450 <
22 JPE 32 451 >
23 LDX 86 452 =
24 CMP 98 453 &
25 JPN 27 454 (
26 OUT 455 )
27 LDD 96 Instruction set
28 INC ACC Instruction
29 STO 96 Op Explanation
Operand
30 INC IX code

31 JMP 21 Direct addressing. Load the contents of


LDD <address>
the location at the given address to ACC.
32 END
Indexed addressing. Form the address
… from <address> + the contents of the
LDX <address>
Index Register. Copy the contents of this
93 453 calculated address to ACC.
94 453 Immediate addressing. Load the number
LDR #n
n to IX.
95 452
96 8 Store contents of ACC at the given
STO <address>
address.
97 10
Add the contents of the given address to
98 453 ADD <address>
ACC.
Add 1 to the contents of the register (ACC
INC <register>
or IX).
IX 8
Subtract 1 from the contents of the
DEC <register>
register (ACC or IX).
Compare contents of ACC with contents of
CMP <address>
<address>.
Following a compare instruction, jump to
JPE <address>
<address> if the compare was True.
Following a compare instruction, jump to
JPN <address>
<address> if the compare was False.
JMP <address> Jump to the given address.
Output to the screen the character whose
OUT
ASCII value is stored in ACC.
END Return control to the operating system.

© UCLES 2018 9608/13/O/N/18


7

Complete the trace table for the given assembly language program.

Instruction Memory address


ACC IX OUTPUT
address 93 94 95 96 97 98
453 453 452 8 10 453 8
20

[7]

© UCLES 2018 9608/13/O/N/18 [Turn over


8

3 This question presents three scenarios. Tick (✓) one box for each scenario to indicate whether
you think the person’s behaviour is ethical or unethical. Justify your choice.

(a) Mason is using his work computer to book a holiday whilst at work.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Ethan is supervising a trainee. The trainee asks Ethan for a reference for another job. Ethan
does not want to lose the trainee, so refuses to give him a reference.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) Margarita finds that one of her team members has produced some inventive code. She
presents this to her manager, praising the individual by name.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 9608/13/O/N/18


9

4 Ava needs to view a website and she knows the Uniform Resource Locator (URL).

(a) Complete the series of steps that take place.

Write the letter of the appropriate statement in each space.

A DNS finds corresponding IP

B DNS looks up URL in table

C Ava types the URL into a web browser

1 ..................................................

2 Web browser sends URL to Domain Name Service (DNS)

3 ..................................................

4 ..................................................

5 DNS returns IP address to web browser


[2]

(b) (i) An IPv4 address has been entered as 12.258.3

Give two reasons why this IP address is invalid.

1 .........................................................................................................................................

...........................................................................................................................................

2 .........................................................................................................................................

...........................................................................................................................................
[2]

(ii) An IPv6 address has been entered as 15EF:5L63::2014:BB::60AA

Give two reasons why this IP address is invalid.

1 .........................................................................................................................................

...........................................................................................................................................

2 .........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2018 9608/13/O/N/18 [Turn over


10

(c) The table shows four descriptions of IP addresses.

Tick (✓) one box in each row to identify whether each description applies to a public or private
IP address.

Description Public Private


The address can be reached over the Internet.
The address is more secure.
The address can only be accessed through the same LAN.
The address can be duplicated in different networks.
[4]

© UCLES 2018 9608/13/O/N/18


11

5 Arnold is a software developer. He has created a computer game for people to download over the
Internet. Arnold is considering releasing the game as a piece of commercial software.

(a) (i) Describe what is meant by a commercial licence.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Name and describe one other type of licence that Arnold can consider using.

Licence type .......................................................................................................................

Description .........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

(b) Users need to enter their name and email address to create an account. The information is
stored in a database on Arnold’s computer.

Give three ways that Arnold can ensure users’ details are kept secure.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2018 9608/13/O/N/18 [Turn over


12

6 The fetch-execute (FE) cycle uses special purpose registers.

(a) The stages in the FE cycle are shown in register transfer notation.

MAR [...............]

PC PC + 1

............... [ [MAR] ]

............... [MDR]

(i) The steps shown in part (a) are incomplete.

Write the missing register names in the spaces in part (a). [3]

(ii) The third instruction [ [MAR] ] has double brackets.

State the purpose of the double brackets.

...........................................................................................................................................

.......................................................................................................................................[1]

(b) One stage of the FE cycle includes checking for interrupts.

State what is meant by an interrupt.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) There are two types of RAM: dynamic RAM (DRAM) and static RAM (SRAM).

The following table shows five statements about DRAM and SRAM.

Tick (✓) one box in each row to indicate whether the statement applies to DRAM or SRAM.

Statement DRAM SRAM

Does not need to be refreshed as the circuit holds the data while the power
supply is on

Mainly used in cache memory of processors where speed is important

Has less complex circuitry

Requires higher power consumption under low levels of access, which is


significant when used in battery-powered devices

Requires data to be refreshed occasionally so it retains the data


[5]
© UCLES 2018 9608/13/O/N/18
13

7 The network manager of a Local Area Network (LAN) has replaced the Ethernet cables with a
wireless network.

(a) Give three benefits of a wireless network compared to a wired network.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

(b) Give one drawback of a wireless network compared to a wired network.

...................................................................................................................................................

...............................................................................................................................................[1]

© UCLES 2018 9608/13/O/N/18 [Turn over


14

8 (a) Draw a logic circuit to represent the logic expression:

X = (A XOR B) OR (NOT(C AND A))

B X

[4]

(b) Complete the truth table for the logic expression in part (a).

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1

[4]

© UCLES 2018 9608/13/O/N/18


15

BLANK PAGE

© UCLES 2018 9608/13/O/N/18


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 9608/13/O/N/18


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 6 0 5 4 1 9 8 9 6 8 *

COMPUTER SCIENCE 9608/12


Paper 1 Theory Fundamentals October/November 2018
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 13 printed pages and 3 blank pages.

DC (NF/CGW) 144492/3
© UCLES 2018 [Turn over
2

1 A company is designing a website.

(a) The company creates a 4-colour bitmap image for the website as shown.

Each colour is represented by a letter, for example, G = grey, K = black.

G R G K W R

G R G K W R

G R G K W R

G R G K W R

G G G K K R

W W W W K R

(i) State the minimum number of bits needed to represent each pixel in the image in part (a).

...................................................................................................................................... [1]

(ii) Calculate the minimum file size of the image shown in part (a). Show your working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

File size .............................................................................................................................


[3]

(b) The company takes a photograph of their office to put on the website. The photograph has
a resolution of 1000 pixels by 1000 pixels. Two bytes per pixel are used to represent the
colours.

(i) Estimate the file size of the photograph in megabytes. Show your working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Estimated file size .............................................................................................................


[4]

© UCLES 2018 9608/12/O/N/18


3

(ii) The file size of the photograph needs to be reduced before it is placed on the website.

Draw lines to link each method of reducing the file size of the image to:

• its description and


• its compression type, where appropriate.

Description Method Compression type

Removes pixels
Crop the
photograph
Reduces number of
Lossy
pixels per inch
Use run-length
encoding
Uses fewer bits per
Lossless
pixel
Use fewer
colours
Stores colour code and
count of repetitions

[5]

(c) The company has created a logo for the website. The logo is a vector graphic.

Describe two reasons why a vector graphic is a sensible choice for the logo.

Reason 1 ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Reason 2 ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2018 9608/12/O/N/18 [Turn over


4

2 Gopal types the Uniform Resource Locator (URL) of a website into a web browser.

(a) The following sequence (1 to 5) describes the steps that take place. There are three missing
statements.

1 Gopal types into the web browser.

2 ......................................

3 DNS looks up the URL in table

4 ......................................

5 ......................................

Three statements A, B and C are used to complete the sequence.

A DNS finds corresponding IP address


B Web browser sends URL to Domain Name Service (DNS)
C DNS returns IP address to web browser

Write one of the letters A to C in the appropriate rows (2, 4 and 5) to complete the sequence.
[2]

(b) Describe the purpose of an IP address.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(c) A telecommunications operator has installed fibre-optic cables in Gopal’s neighbourhood.

(i) Give three benefits of fibre-optic cable over copper cable.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2018 9608/12/O/N/18


5

(ii) Give two drawbacks of fibre-optic cable over copper cable.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2018 9608/12/O/N/18 [Turn over


6

3 The following table shows assembly language instructions for a processor which has one general
purpose register, the Accumulator (ACC) and an Index Register (IX).

Instruction
Explanation
Op code Operand

LDD <address> Direct addressing. Load the contents of the location at the given address to
ACC.
LDX <address> Indexed addressing. Form the address from <address> + the contents of the
Index Register. Copy the contents of this calculated address to ACC.
LDR #n Immediate addressing. Load the number n to IX.
STO <address> Store contents of ACC at the given address.
ADD <address> Add the contents of the given address to ACC.
INC <register> Add 1 to the contents of the register (ACC or IX).
DEC <register> Subtract 1 from the contents of the register (ACC or IX).
CMP <address> Compare contents of ACC with contents of <address>.
JPE <address> Following compare instruction, jump to <address> if the compare was True.
JPN <address> Following compare instruction, jump to <address> if the compare was False.
JMP <address> Jump to the given address.
OUT Output to the screen the character whose ASCII value is stored in ACC.
END Return control to the operating system.

(a) (i) State what is meant by absolute addressing and symbolic addressing.

Absolute addressing ..........................................................................................................

...........................................................................................................................................

Symbolic addressing .........................................................................................................

...........................................................................................................................................
[2]

(ii) Give an example of an ADD instruction using both absolute addressing and symbolic
addressing.

Absolute addressing ..........................................................................................................

Symbolic addressing .........................................................................................................


[2]

© UCLES 2018 9608/12/O/N/18


7

(b) (i) State what is meant by indexed addressing and immediate addressing.

Indexed addressing ...........................................................................................................

...........................................................................................................................................

Immediate addressing .......................................................................................................

...........................................................................................................................................
[2]

(ii) Give an example of an instruction that uses:

Indexed addressing ...........................................................................................................

Immediate addressing .......................................................................................................


[2]

(c) The current contents of a general purpose register (X) are:

X 1 1 0 0 0 0 0 1

(i) The contents of X represent an unsigned binary integer.

Convert the value in X into denary.

...................................................................................................................................... [1]

(ii) The contents of X represent an unsigned binary integer.

Convert the value in X into hexadecimal.

...................................................................................................................................... [1]

(iii) The contents of X represent a two’s complement binary integer.

Convert the value in X into denary.

...................................................................................................................................... [1]

© UCLES 2018 9608/12/O/N/18 [Turn over


8

(d) The current contents of the main memory, Index Register (IX) and selected values from the
ASCII character set are:

Address Instruction ASCII code table (selected codes only)


40 LDD 100 ASCII code Character
41 CMP 104 300 /
42 JPE 54 301 *
43 LDX 100 302 -
44 CMP 105 303 +
45 JPN 47 304 ^
46 OUT 305 =
47 LDD 100
48 DEC ACC
49 STO 100
50 INC IX
51 JMP 41
52
53
54 END

100 2
101 302
102 303
103 303
104 0
105 303

IX 1

This is a copy of the instruction set.

Instruction
Explanation
Op code Operand

LDD <address> Direct addressing. Load the contents of the location at the given address to
ACC.
LDX <address> Indexed addressing. Form the address from <address> + the contents of the
Index Register. Copy the contents of this calculated address to ACC.
LDR #n Immediate addressing. Load the number n to IX.
STO <address> Store contents of ACC at the given address.
ADD <address> Add the contents of the given address to ACC.
INC <register> Add 1 to the contents of the register (ACC or IX).
DEC <register> Subtract 1 from the contents of the register (ACC or IX).
CMP <address> Compare contents of ACC with contents of <address>.
JPE <address> Following a compare instruction, jump to <address> if the compare was True.
JPN <address> Following a compare instruction, jump to <address> if the compare was False.
JMP <address> Jump to the given address.
OUT Output to the screen the character whose ASCII value is stored in ACC.
END Return control to the operating system.

© UCLES 2018 9608/12/O/N/18


9

Complete the trace table for the given assembly language program.

Instruction Memory address


address ACC IX OUTPUT
100 101 102 103 104 105
2 302 303 303 0 303 1
40

[7]

© UCLES 2018 9608/12/O/N/18 [Turn over


10

4 A student has written the steps of the fetch stage of the fetch-execute (FE) cycle in register transfer
notation. The student has made some errors.

Line 1 MDR [PC]

Line 2 PC PC + 1

Line 3 MDR [MAR]

Line 4 CIR PC

(a) Identify the line numbers of three errors that the student has made. Write the correct notation
for each error.

Line number of error Correct notation

[3]

(b) One stage of the FE cycle includes checking for interrupts.

(i) Give three different events that can generate an interrupt.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

(ii) Explain how interrupts are handled during the fetch-execute cycle.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [5]
© UCLES 2018 9608/12/O/N/18
11

(c) The processor uses buses in the FE cycle.

The diagram shows three buses and two descriptions.

Draw one line from each bus to its appropriate description.

Bus Description

Control bus
Unidirectional
(one direction)

Address bus

Bidirectional
(two directions)
Data bus

[2]

5 This question presents three scenarios. For each scenario, tick (✓) one box to show whether you
think the person’s behaviour is ethical or unethical. Justify your choice.

(a) Wendy is a software engineer who is developing a program for her company. Her friend,
Noah, is developing a program for a different company. Wendy looks at the code that Noah is
writing to get ideas for her own program.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© UCLES 2018 9608/12/O/N/18 [Turn over


12

(b) Amit is fixing some bugs in the computer system of a large multinational company. He is
asked to sign a confidentiality agreement. He sees some confidential information which
contains the names of other multinational companies that have broken the law. He copies this
information and releases it on the Internet.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(c) Farah is providing a company with an estimate for the cost of writing a program. The company
she works for is in financial difficulty so she increases the estimate by 10%.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

6 Kim is using her laptop computer to write a program in a high-level language.

(a) Kim needs to make sure the program is secure against unauthorised access. She has already
set up a username and password on her laptop.

Identify two additional electronic measures that Kim can use to keep the program secure.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Kim will use library routines in her program.

(i) Describe what is meant by a library routine.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

© UCLES 2018 9608/12/O/N/18


13

(ii) Describe one benefit and one drawback of using library routines.

Benefit ...............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Drawback ..........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

(c) Kim develops her program and makes it ready for use. To do this, she uses first an interpreter
and then a compiler.

Explain why Kim needs to use both an interpreter and a compiler.

Interpreter .................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Compiler ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2018 9608/12/O/N/18


14

BLANK PAGE

© UCLES 2018 9608/12/O/N/18


15

BLANK PAGE

© UCLES 2018 9608/12/O/N/18


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 9608/12/O/N/18


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 8 9 3 1 1 6 5 4 3 6 *

COMPUTER SCIENCE 9608/11


Paper 1 Theory Fundamentals October/November 2018
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 15 printed pages and 1 blank page.

DC (ST) 144490/3
© UCLES 2018 [Turn over
2

1 A student is creating a short video and needs to record music to play in the background.

(a) The student uses a microphone to capture the music.

Explain how the microphone captures the music.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) An analogue-to-digital converter uses sampling to encode the sound.

Explain how different sampling resolutions affect the sound file and the sound it represents.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(c) The student needs to edit the sound file.

Describe two features of sound editing software that can be used to edit the sound file.

Feature 1 ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Feature 2 ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2018 9608/11/O/N/18


3

(d) The video is recorded with a frame rate of 60 frames per second (fps) and uses progressive
encoding.

(i) Describe what is meant by a frame rate of 60 fps.

...........................................................................................................................................

.......................................................................................................................................[1]

(ii) Describe what is meant by progressive encoding in video recording.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(e) MP4 multimedia container format is used to save the video.

State what is meant by multimedia container format.

...................................................................................................................................................

...............................................................................................................................................[1]

© UCLES 2018 9608/11/O/N/18 [Turn over


4

2 Computer A needs to access a web page.

(a) State how Computer A could access the web page without using a Domain Name Service
(DNS).

...................................................................................................................................................

...............................................................................................................................................[1]

(b) (i) The following table shows four IPv6 addresses.

State if each address is valid or invalid.

IP address Valid or invalid

21E5:69AA:FFFF:1:E100:B691:1285:F56E

::255.255.255.255

59FB::1005:CC57:6571

56FE::2159:5BBC::6594

[4]

(ii) The following table shows four statements about either public or private IP addresses.

Tick (3) one box in each row to indicate whether each statement refers to a public or a
private IP address.

Statement Public Private

192.168.2.1 is an example of this type of address

Assigned by the Internet Service Provider (ISP)

IP address cannot be duplicated in different


networks
Network Address Translation (NAT) is necessary
to access the Internet directly
[4]

(c) One type of transmission media is copper cable.

Give two additional types of transmission media.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

© UCLES 2018 9608/11/O/N/18


5

3 Hugo has produced a program (app) for mobile phones. He needs to decide whether to use an
Open Source licence or to distribute the app as shareware.

(a) Describe what is meant by Open Source licence and shareware.

Open Source ............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Shareware ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(b) Tick (3) one box to indicate the licence Hugo should use. Justify your choice.

Open Source
Shareware

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 9608/11/O/N/18 [Turn over


6

4 The table shows assembly language instructions for a processor which has one general purpose
register, the Accumulator (ACC) and an index register (IX).

Instruction
Explanation
Op code Operand
Direct addressing. Load the contents of the location at the given
LDD <address>
address to ACC.
Indexed addressing. Form the address from <address> + the
LDX <address> contents of the Index Register. Copy the contents of this calculated
address to ACC.
LDR #n Immediate addressing. Load the number n to IX.
STO <address> Store contents of ACC at the given address.
ADD <address> Add the contents of the given address to ACC.
INC <register> Add 1 to the contents of the register (ACC or IX).
DEC <register> Subtract 1 from the contents of the register (ACC or IX).
CMP <address> Compare contents of ACC with contents of <address>.
Following a compare instruction, jump to <address> if the compare
JPE <address>
was True.
Following a compare instruction, jump to <address> if the compare
JPN <address>
was False.
JMP <address> Jump to the given address.
OUT Output to the screen the character whose ASCII value is stored in ACC.
END Return control to the operating system.

(a) (i) State what is meant by direct addressing and indirect addressing.

Direct addressing ..............................................................................................................

...........................................................................................................................................

Indirect addressing ............................................................................................................

...........................................................................................................................................
[2]

(ii) Explain how the instruction ADD 20 can be interpreted as either direct or indirect
addressing.

Direct addressing ..............................................................................................................

...........................................................................................................................................

Indirect addressing ............................................................................................................

...........................................................................................................................................
[2]

© UCLES 2018 9608/11/O/N/18


7

(b) The assembly language instructions in the following table use either symbolic addressing or
absolute addressing.

Tick (3) one box in each row to indicate whether the instruction uses symbolic or absolute
addressing.

Instruction Symbolic Absolute

ADD 90

CMP found

STO 20

[2]

(c) The current contents of a general purpose register (X) are:

X 1 0 1 1 1 0 1 0

(i) The contents of X represent an unsigned binary integer.

Convert the value in X into denary.

.......................................................................................................................................[1]

(ii) The contents of X represent an unsigned binary integer.

Convert the value in X into hexadecimal.

.......................................................................................................................................[1]

(iii) The contents of X represent a two’s complement binary integer.

Convert the value in X into denary.

.......................................................................................................................................[1]

© UCLES 2018 9608/11/O/N/18 [Turn over


8

(d) The current contents of the main memory, Index Register (IX) and selected values from the
ASCII character set are provided with a copy of the instruction set.

Address Instruction ASCII code table (selected codes only)


70 LDX 200 ASCII code Character
71 OUT 127 ?
72 STO 203 128 !
73 LDD 204 129 “
74 INC ACC 130 *
75 STO 204 131 $
76 INC IX 132 &
77 LDX 200 133 %
78 CMP 203 134 /
79 JPN 81
Instruction set
80 OUT
81 LDD 204 Instruction
Op Explanation
82 CMP 205 Operand
code
83 JPN 74
Direct addressing. Load the contents of
84 END LDD <address>
the location at the given address to ACC.
… Indexed addressing. Form the address
from <address> + the contents of the
LDX <address>
200 130 Index Register. Copy the contents of this
calculated address to ACC.
201 133
Immediate addressing. Load the number
202 130 LDR #n
n to IX.
203 0 Store contents of ACC at the given
STO <address>
address.
204 0
Add the contents of the given address to
205 2 ADD <address>
ACC.
Add 1 to the contents of the register (ACC
INC <register>
or IX).
IX 0
Subtract 1 from the contents of the
DEC <register>
register (ACC or IX).
Compare contents of ACC with contents of
CMP <address>
<address>.
Following a compare instruction, jump to
JPE <address>
<address> if the compare was True.
Following a compare instruction, jump to
JPN <address>
<address> if the compare was False.
JMP <address> Jump to the given address.
Output to the screen the character whose
OUT
ASCII value is stored in ACC.
END Return control to the operating system.

© UCLES 2018 9608/11/O/N/18


9

Complete the trace table for the given assembly language program.

Instruction Memory address


ACC IX OUTPUT
address 200 201 202 203 204 205

70 130 130 133 130 0 0 2 0

[8]

© UCLES 2018 9608/11/O/N/18 [Turn over


10

5 For each of the following scenarios, tick (3) one box for each scenario to indicate whether you
think the person’s behaviour is ethical or unethical. Justify your choice.

(a) Kevin is a software engineer who has recently started a job with a new company. He is using
program code from his previous employer in his new employer’s programs.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Nadya is a software developer. She has accepted a new job. She has never worked with
the programming languages used by this new company. Nadya is planning to increase her
knowledge of these programming languages before she starts her new job.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) Maria finds that one of her team members has produced some inventive code. She presents
this to her manager, stating that it was produced by the team. She does not mention the
individual’s name.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 9608/11/O/N/18


11

6 A web page includes the following PHP and HTML code.

01 <?php
02 if(isset($_GET['age'])) {
03 echo "Result: ", allowed($_GET['age']);
04 } else {
05 ?>
06
07 <form action="#" method="get">
08 Enter Age: <input type="text" name="age" /><br/>
09 <input type="submit" value="Calculate" />
10 </form>
11
12 <?php
13 }
14 function allowed($age) {
15 if($age <= 16) $message = "You need permission";
16 else if($age > 30) $message = "You are too old";
17 else $message = "Allowed";
18 return $message;
19 }
20 ?>

(a) Name two identifiers used in the PHP code.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Write the value assigned to $message if the user types 30 in the text box.

...............................................................................................................................................[1]

(c) Explain the purpose of the code in line 18.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 9608/11/O/N/18 [Turn over


12

(d) The PHP code in a web page uses server-side scripting.

List the sequence of events that take place when a user requests a web page containing PHP
code.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2018 9608/11/O/N/18


13

Question 7 begins on the next page.

© UCLES 2018 9608/11/O/N/18 [Turn over


14

7 A movie theatre has a relational database that stores the movie schedule, and information about
the movies. The theatre has several screens that play movies at the same time.

The database has three tables to store information about the movies, the screens and the movie
schedule.

MOVIE(MovieID, Title, Length, Rating)

SCREEN(ScreenNumber, NumberSeats)

MOVIESCHEDULE(ScheduleID, MovieID, ScreenNumber, Time)

(a) Complete the entity-relationship (E-R) diagram to show the relationships between these
tables.

MOVIE SCREEN

MOVIESCHEDULE

[2]

(b) Explain how primary and foreign keys are used to link the tables in the movie theatre
database.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2018 9608/11/O/N/18


15

(c) The database needs to store the name of the company that produced each movie, for
example, Rocking Movies.

Write an SQL script to add the attribute ProductionCompany to the MOVIE table.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(d) Write an SQL script to display the title and rating of all movies scheduled to play on screen
number 3.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2018 9608/11/O/N/18


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 9608/11/O/N/18


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 6 1 8 6 1 5 1 0 2 7 *

COMPUTER SCIENCE 9608/13


Paper 1 Theory Fundamentals May/June 2018
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 15 printed pages and 1 blank page.

DC (NH/SW) 144489/2
© UCLES 2018 [Turn over
2

1 A web page includes the following HTML and PHP code.

01 <?php
02 if(isset($_GET['mark'])) {
03 echo "Grade: " . calculateGrade($_GET['mark']);
04 } else {
05 ?>
06
07 <form action="#" method="get">
08 Enter Mark: <input type="text" name="mark" /><br />
09 <input type="submit" value="Calculate" />
10 </form>
11
12 <?php
13 }
14
15 function calculateGrade($inputMark) {
16 $gradeChar = "U";
17 if($inputMark >= 80) $gradeChar = "A";
18 else if($inputMark >= 70) $gradeChar = "B";
19 else if($inputMark >= 60) $gradeChar = "C";
20 else if($inputMark >= 50) $gradeChar = "D";
21 else if($inputMark >= 40) $gradeChar = "E";
22 return $gradeChar;
23 }
24 ?>

(a) Give the identifier of two variables used in the PHP code.

Identifier 1 .................................................................................................................................

Identifier 2 .................................................................................................................................
[2]

(b) Give the line number where the PHP code produces an output.

...............................................................................................................................................[1]

(c) Describe the purpose of the expression $_GET['mark'] in line 03.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(d) State whether this PHP code will run client-side or server-side.

...............................................................................................................................................[1]

© UCLES 2018 9608/13/M/J/18


3

2 A company writes applications (apps) for smartphones. The company has a relational database,
PURPLEGAME, which stores the information for one of its online game apps.

The database has three tables to store player’s details, dates when they have logged into the app
and in-app purchase details.

LOGIN(LoginID, PlayerID, Date)

PURCHASE(PurchaseID, PlayerID, PurchaseDate, Cost)

PLAYER(PlayerID, PlayerName, SkillLevel)

(a) Draw the entity-relationship (E-R) diagram to show the relationships between the three tables.

[2]

(b) The database manager is concerned about data integrity.

State what is meant by data integrity. Give an example of how the manager can ensure data
integrity in the PURPLEGAME database.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 9608/13/M/J/18 [Turn over


4

(c) The database designer states that the PURPLEGAME database is in Third Normal Form (3NF).

Tick (3) one box to indicate whether this statement is true or false.

True False

Justify your choice.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(d) (i) The following table shows some sample data for the PLAYER table.

PlayerID PlayerName SkillLevel


fly918 Kylie 3
elephant11 Mehrdad 9
candy22 Suzi 15
greenGrass Jason 22

Write an SQL script to create the PLAYER table.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[5]

© UCLES 2018 9608/13/M/J/18


5

(ii) The table, PLAYER, needs to be altered. A new field, DateOfBirth, needs to be added.

Write an SQL script to add the DateOfBirth field to the PLAYER table.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2018 9608/13/M/J/18 [Turn over


6

3 A computer is designed using the Von Neumann model.

(a) Describe the role of the Arithmetic and Logic Unit (ALU) and Control Unit (CU) in the Von
Neumann model.

ALU ...........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

CU ............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(b) Describe the role of the Status Register and Program Counter (PC).

Status Register .........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

PC .............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2018 9608/13/M/J/18


7

(c) H is a register. The current contents of H are:

1 1 0 0 0 0 0 1

The current contents of register H represent an unsigned binary integer.

(i) Convert the value in register H into denary.

.......................................................................................................................................[1]

(ii) Convert the value in register H into hexadecimal.

.......................................................................................................................................[1]

(iii) The current contents of register H represent a two’s complement binary integer.

Convert the value in register H into denary.

.......................................................................................................................................[1]

(iv) State why register H does not currently contain a Binary Coded Decimal (BCD).

...........................................................................................................................................

.......................................................................................................................................[1]

© UCLES 2018 9608/13/M/J/18 [Turn over


8

4 Parity bits can be used to verify data.

(a) The following binary number is transmitted using odd parity.

Add the missing parity bit.

Parity
bit

0 1 1 1 0 1 0

[1]

(b) In the following parity block, the first column contains the parity bits, and the last row contains
the parity byte. A device transmits the data using even parity.

Circle the error in the data being transmitted.

Parity
Data
bit
0 0 1 1 0 1 0 1
1 1 1 1 1 0 0 1
1 0 1 0 1 0 0 0
0 0 0 1 1 0 1 1
Parity
0 1 1 1 1 1 0 1
byte
[1]

(c) Four error detection measures are shown.

Draw one line from each error detection measure to indicate whether it is verification or
validation.
Error detection measure

Type check

Proof reading Verification

Check digit Validation

Checksum

[4]
© UCLES 2018 9608/13/M/J/18
9

Question 5 begins on the next page.

© UCLES 2018 9608/13/M/J/18 [Turn over


10

5 (a) A student needs to design a logic circuit to model the requirements for membership of a
snooker club. Membership (X) depends on four criteria, as shown in the table:

Description of Binary
Parameter Condition
parameter value
1 True
A Over 18
0 False
1 True
B Recommended
0 False
1 True
C Full-time
0 False
1 True
D Retired
0 False

Membership is approved (X = 1) if the person:

• is over the age of 18 and has been recommended by a pre-existing member and
• either is working full-time or is retired, but not both.

Draw a logic circuit to represent the membership requirements.

[3]

© UCLES 2018 9608/13/M/J/18


11

(b) Complete the truth table for the logic expression: X = (A XOR B) AND NOT C

A B C Working space X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2018 9608/13/M/J/18 [Turn over


12

6 A black and white bitmap image is shown.

(a) State the minimum number of bits needed to represent each pixel in this image.

...............................................................................................................................................[1]

(b) Run-length encoding (RLE) is used to store the image with the following colour codes.

Colour Code
Black 1A
White 3B

Show how run-length encoding is used to store the image.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(c) An image has 30 different colours.

State the minimum number of bits needed to represent each pixel in the 30-colour image.

...............................................................................................................................................[1]

© UCLES 2018 9608/13/M/J/18


13

(d) When the image is saved, a header is added to the file.

State the purpose of the file header. Give two examples of the file header contents.

Purpose ....................................................................................................................................

...................................................................................................................................................

Example 1 .................................................................................................................................

...................................................................................................................................................

Example 2 .................................................................................................................................

...................................................................................................................................................
[3]

(e) Graphics software is used to edit a digital photograph.

Give three features of graphics software that can be used to edit the photograph.

Describe the effect each has on the photograph.

Feature 1 ...................................................................................................................................

Effect .........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Feature 2 ...................................................................................................................................

Effect .........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Feature 3 ...................................................................................................................................

Effect .........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2018 9608/13/M/J/18 [Turn over


14

7 A zoo has a computer system for the visitors to access multimedia content about the zoo and its
animals.

(a) The users interact with the computer system through touchscreens.

Describe the internal operation of a touchscreen.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) (i) Give one output device, other than a touchscreen, that may be part of this computer
system.

.......................................................................................................................................[1]

(ii) Give two input devices, other than a touchscreen, that may be part of this computer
system. State how each device will be used by the visitors.

Device 1 .............................................................................................................................

Use ....................................................................................................................................

...........................................................................................................................................

Device 2 .............................................................................................................................

Use ....................................................................................................................................

...........................................................................................................................................
[4]

© UCLES 2018 9608/13/M/J/18


15

(c) Give the most appropriate secondary storage device for this computer system.

Describe two reasons for your choice.

Device .......................................................................................................................................

Reason 1 ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Reason 2 ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[5]

(d) This computer system has Random Access Memory (RAM) and Read Only Memory (ROM).

State what will be stored in RAM and ROM for this computer system.

RAM ..........................................................................................................................................

...................................................................................................................................................

ROM ..........................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2018 9608/13/M/J/18


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 9608/13/M/J/18


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 4 8 6 1 1 1 0 3 2 0 *

COMPUTER SCIENCE 9608/12


Paper 1 Theory Fundamentals May/June 2018
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 14 printed pages and 2 blank pages.

DC (SC/CGW) 144488/3
© UCLES 2018 [Turn over
2

1 An operating system (OS) is usually pre-installed on a new computer.

(a) The OS performs a number of different tasks such as file management and peripheral
management.

(i) State three file management tasks the OS performs.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

(ii) State three printer management tasks the OS performs.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

(b) Utility software is usually pre-installed on a new computer.

(i) The following table lists four programs. Put one tick (3) in each row to indicate whether
or not the program is utility software.

Program True False

Database

Virus checker

Web browser

Backup software
[4]

(ii) Name two other utility programs.

Program 1 .........................................................................................................................

Program 2 .........................................................................................................................
[2]
© UCLES 2018 9608/12/M/J/18
3

Question 2 begins on the next page.

© UCLES 2018 9608/12/M/J/18 [Turn over


4

2 (a) A greenhouse control system has four input parameters (H, D, T, W) and two outputs (X, Y).

Description of
Parameter Binary value Condition
parameter
0 Too low
H Humidity
1 Acceptable
0 Night
D Day
1 Day
0 Too high
T Temperature
1 Acceptable
0 Closed
W Windows
1 Open

The watering system turns on (X = 1) if:

either it is daytime and the temperature is too high

or the humidity is too low.

The fan turns on (Y = 1) if the temperature is too high and the windows are closed.

Draw a logic circuit to represent the greenhouse control system.

T
Y

[6]

© UCLES 2018 9608/12/M/J/18


5

(b) Complete the truth table for the logic expression: X = NOT A AND (B NAND C)

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1

[4]

© UCLES 2018 9608/12/M/J/18 [Turn over


6

3 Parity bits can be used to verify data.

(a) The following binary number is transmitted using odd parity.

Add the missing parity bit.

Parity
bit

0 1 0 0 0 0 0

[1]

(b) In the following data transmitted, the first column contains the parity bits, and the last row
contains the parity byte. A device transmits the data using even parity.

Circle the error in the data transmitted.

Parity
Data
bit

1 0 1 0 1 1 1 1

0 1 1 0 0 1 1 0

1 1 0 0 0 0 0 0

0 1 0 0 0 0 0 0

Parity
0 0 0 0 1 0 0 1
byte
[1]

(c) The following table shows five error detection measures.

Put one tick (3) in each row to indicate whether the measure is validation or verification.

Measure Validation Verification

Checksum

Format check

Range check

Double entry

Check digit

[5]

© UCLES 2018 9608/12/M/J/18


7

4 (a) The Accumulator is a register. The current contents of the Accumulator are:

1 1 0 1 1 0 1 1

The current contents of the Accumulator represent an unsigned binary integer.

(i) Convert the value in the Accumulator into denary.

.......................................................................................................................................[1]

(ii) Convert the value in the Accumulator into hexadecimal.

.......................................................................................................................................[1]

(iii) The current contents of the Accumulator represent a two’s complement binary integer.

Convert the value in the Accumulator into denary.

.......................................................................................................................................[1]

(b) The binary integer represents a character from the computer’s character set.

(i) Define the term character set.

...........................................................................................................................................

.......................................................................................................................................[1]

(ii) Explain the differences between the ASCII and Unicode character sets.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(iii) The ASCII code for ‘A’ is 41 in hexadecimal.

Calculate the ASCII code in hexadecimal for ‘Z’. Show your working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

ASCII code in hexadecimal for ‘Z’ .....................................................................................


[2]

© UCLES 2018 9608/12/M/J/18 [Turn over


8

5 A student has recorded a sound track for a short film.

(a) Explain how an analogue sound wave is sampled to convert it into digital format.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) Explain the effects of increasing the sampling resolution on the sound file.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) The original sound was sampled at 44.1 kHz. The sample rate is changed to 22.05 kHz.

Explain the effects of this change on the sound file.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2018 9608/12/M/J/18


9

(d) The student uses sound editing software to edit the sound file.

Name two features of sound editing software the student can use to edit the sound file.

Describe the purpose of each feature.

Feature 1 ...................................................................................................................................

Purpose .....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Feature 2 ...................................................................................................................................

Purpose .....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

Question 6 begins on the next page.

© UCLES 2018 9608/12/M/J/18 [Turn over


10

6 A web page includes the following HTML and JavaScript code.

01 <html>
02 <body>
03
04 <p>Enter your mark</p>
05 <input id="Mark" value="0">
06 <button onclick="calcGrade()">Enter</button>
07
08 <script>
09 function calcGrade() {
10 var mark, grade;
11 mark = document.getElementById("Mark").value;
12 if (mark >= 90) {
13 grade = "A"
14 } else if (mark >= 80) {
15 grade = "B"
16 } else if (mark >= 70) {
17 grade = "C"
18 } else if (mark >= 60) {
19 grade = "D"
20 } else if (mark >= 50) {
21 grade = "E"
22 } else {
23 grade = "U"
24 }
25 alert("Your grade is " + grade)
26 }
27 </script>
28
29 </body>
30 </html>

(a) Give the identifier of two variables used in the JavaScript code.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Give the line number where the JavaScript code produces an output.

...............................................................................................................................................[1]

(c) Describe the purpose of the statement on line 11.

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 9608/12/M/J/18


11

(d) (i) State whether this JavaScript code will be run client-side or server-side.

.......................................................................................................................................[1]

(ii) Explain the difference between client-side scripting and server-side scripting.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

© UCLES 2018 9608/12/M/J/18 [Turn over


12

7 A social media website has a relational database, WEBDATA, that stores the site’s information.

The database has three tables to store users’ details, and details of the images and text that they
post.

USER(UserName, FirstName, SecondName, DateOfBirth)


PHOTO(PhotoID, UserName, Comment, UploadDate)
TEXTPOST(PostID, UserName, DateOfPost, TheText)

(a) (i) Explain how the relationship between the tables USER and PHOTO has been implemented.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Draw the entity-relationship (E-R) diagram to show the relationships between the three
tables.

[2]

(b) A database administrator decides to enforce referential integrity.

Use an example from the database WEBDATA to explain what is meant by referential
integrity.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2018 9608/12/M/J/18


13

(c) The database has been normalised to Third Normal Form (3NF).

Define the three stages of database normalisation.

1NF ............................................................................................................................................

...................................................................................................................................................

2NF ............................................................................................................................................

...................................................................................................................................................

3NF ............................................................................................................................................

...................................................................................................................................................
[3]

(d) The following shows sample data from the USER table.

UserName FirstName SecondName DateOfBirth

gem123 John Smith 01/01/1995

purpleSky Muhammed Ali 23/02/1956

OpenWindow Sunny Amir 03/03/1997

bluebird127 Raziya Bello 04/03/1982

(i) Write an SQL script to create the USER table.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[5]

© UCLES 2018 9608/12/M/J/18 [Turn over


14

(ii) The database administrator needs to alter the USER table. A new field, Country, needs
to be added.

Write an SQL script to add the field Country to the USER table.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2018 9608/12/M/J/18


15

BLANK PAGE

© UCLES 2018 9608/12/M/J/18


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 9608/12/M/J/18


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 9 6 5 7 7 2 6 3 0 5 *

COMPUTER SCIENCE 9608/11


Paper 1 Theory Fundamentals May/June 2018
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 15 printed pages and 1 blank page.

DC (LEG/FC) 144487/2
© UCLES 2018 [Turn over
2

Question 1 begins on the next page.

© UCLES 2018 9608/11/M/J/18


3

1 Four communication media and five features are shown.

Draw one or more lines from each communication media to the appropriate feature(s).

Communication media Feature

Can be twisted pair or co-axial

Fibre-optic cable

Transmits light pulses

Radio waves

Large range of wavelengths

Copper cable

Least likely to have interference

Satellite

Wireless transmission

[6]

© UCLES 2018 9608/11/M/J/18 [Turn over


4

2 A logo is designed as a bitmap image.

(a) Describe what is meant by a bitmap image.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) A black and white bitmap image is shown.

(i) Explain how a computer can store this bitmap image.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) The image is compressed before it is attached to an email.

Explain how run-length encoding (RLE) will compress the image.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2018 9608/11/M/J/18


5

(c) The finished logo is 500 pixels by 1000 pixels and uses 35 different colours.

Estimate the file size for the logo. Give your answer in kilobytes. Show your working.

Working .....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Answer ......................................................................................................................................
[4]

(d) The logo is redesigned as a vector graphic.

State two benefits of a vector graphic compared to a bitmap image. Give a reason for each
benefit.

Benefit 1 ...................................................................................................................................

...................................................................................................................................................

Reason 1 ..................................................................................................................................

...................................................................................................................................................

Benefit 2 ...................................................................................................................................

...................................................................................................................................................

Reason 2 ..................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2018 9608/11/M/J/18 [Turn over


6

3 An operating system (OS) is usually pre-installed on a new computer.

(a) The OS performs a number of different tasks such as memory management and security
management.

(i) State three memory management tasks the OS performs.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

(ii) State three security management tasks the OS performs.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

(iii) State two tasks, other than memory management and security management that are
carried out by an OS.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2018 9608/11/M/J/18


7

(b) Utility software is usually pre-installed on a new computer.

The following table lists four programs. Put one tick (✓) in each row to indicate whether or not
the program is utility software.

Program True False

Disk Defragmenter

Word Processor

Library Program

Compression Software

[4]

© UCLES 2018 9608/11/M/J/18 [Turn over


8

4 (a) An alarm system (X) is enabled and disabled using either a switch (A) or a remote control (B).
There are two infra-red sensors (C, D) and one door pressure sensor (E).

Description of
Parameter Binary value Condition
parameter
1 Switch enabled
A Switch
0 Switch disabled
1 Remote enabled
B Remote control
0 Remote disabled
1 Activated
C Infra-red sensor
0 Not activated
1 Activated
D Infra-red sensor
0 Not activated

Door pressure 1 Activated


E
sensor 0 Not activated

The alarm sounds (X = 1) if the alarm is enabled and any one or more of the sensors is
activated.

Draw a logic circuit to represent the alarm system.

C
X

[3]

© UCLES 2018 9608/11/M/J/18


9

(b) Complete the truth table for the logic expression: X = A OR (B XOR C)

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2018 9608/11/M/J/18 [Turn over


10

5 A college has a client-server network.

(a) The college has a file server and other servers.

State the purpose of two other servers in the college network.

Server 1 ....................................................................................................................................

Server 2 ....................................................................................................................................
[2]

(b) The students use the network to access the Internet.

One student stated, ‘The Internet and the World Wide Web are the same thing’.

Tick (✓) one box to indicate whether this statement is true or false.

True False

Justify your choice.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

© UCLES 2018 9608/11/M/J/18


11

(c) Students use the college’s learning resource website. Several of the web pages include PHP
script.

Describe the sequence of events when a student requests a web page with embedded
server-side code.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2018 9608/11/M/J/18 [Turn over


12

6 Parity bits can be used to verify data.

(a) The following binary number is transmitted using even parity.

Add the missing parity bit.

Parity
bit

1 0 1 1 0 1 0
[1]

(b) In the following parity block, the first column contains the parity bits, and the last row contains
the parity byte. A device transmits the data using even parity.

(i) Circle the error in the data transmitted.

Parity
Data
bit

1 1 0 1 0 1 1 1

1 0 0 0 1 1 1 0

0 1 0 0 1 0 1 1

1 1 1 0 1 1 1 1

Parity
1 1 1 1 1 0 0 1
byte
[1]

(ii) Explain how you identified the error.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(c) The data received can contain errors that are not detected using parity bits.

Explain how this can happen.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]
© UCLES 2018 9608/11/M/J/18
13

(d) Parity is not the only method to verify the data has been sent correctly.

Name and describe one other method of data verification during data transfer.

Name ........................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2018 9608/11/M/J/18 [Turn over


14

7 A student plays computer games on a games console.

(a) Identify two input devices and one output device used in a games console.

Input device 1 ...........................................................................................................................

Input device 2 ...........................................................................................................................

Output device ...........................................................................................................................


[3]

(b) The games console has random access memory (RAM) and read only memory (ROM).

(i) State two differences between RAM and ROM.

Difference 1 .......................................................................................................................

...........................................................................................................................................

Difference 2 .......................................................................................................................

...........................................................................................................................................
[2]

(ii) Give one use for RAM in the games console.

...........................................................................................................................................

.......................................................................................................................................[1]

(iii) Give one use for ROM in the games console.

...........................................................................................................................................

.......................................................................................................................................[1]

© UCLES 2018 9608/11/M/J/18


15

8 The Von Neumann model uses a series of registers.

(a) Explain what is meant by the term register.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) (i) Explain the purpose of the Memory Data Register (MDR).

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Name two registers, other than the MDR, that are used in the fetch-execute cycle.

Register 1 ..........................................................................................................................

Register 2 ..........................................................................................................................
[2]

(c) X is a register. The current contents of X are:

1 0 0 0 0 1 1 1

(i) The current contents of register X represent an unsigned binary integer.

Convert the value in X into denary.

.......................................................................................................................................[1]

(ii) The current contents of register X represent a Binary Coded Decimal.

Convert the value in X into denary.

.......................................................................................................................................[1]

(iii) The current contents of register X stores a two’s complement binary integer.

Convert the value in X into denary.

.......................................................................................................................................[1]

© UCLES 2018 9608/11/M/J/18


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 9608/11/M/J/18


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 3 2 2 0 4 1 3 8 5 2 *

COMPUTER SCIENCE 9608/13


Paper 1 Theory Fundamentals October/November 2017
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.

The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 16 printed pages.

DC (JP) 147948
© UCLES 2017 [Turn over
2

1 (a) Each of the following bytes represents an integer in two’s complement form.

State the denary value.

(i) 0111 0111 Denary .................................................. [1]

(ii) 1000 1000 Denary .................................................. [1]

(iii) Express the following integer in two’s complement form.

-17

[1]

(iv) State in denary, the range of integer values that it is possible to represent in two’s
complement integers using a single byte.

Lowest value ..................................................

Highest value .................................................. [1]

(b) (i) Convert the following denary integer into Binary Coded Decimal (BCD).

653

.......................................................................................................................................[1]

(ii) A 3-digit BCD representation has been incorrectly copied. It is shown as:

0 1 0 0 1 1 1 0 0 0 1 0

State how you can recognise that this is not a valid BCD representation.

...........................................................................................................................................

.......................................................................................................................................[1]

(iii) Describe a practical application where BCD is used.

...........................................................................................................................................

.......................................................................................................................................[1]

© UCLES 2017 9608/13/O/N/17


3

2 (a) The diagram shows three items of software that translate program code.

Draw one line from each context to the correct item of translation software.

Context Item of translation software

A web page contains a client-side script.

Assembler

Each instruction in the source code


consists of an op code and an operand.

Interpreter

The source code is required at run-time.

Compiler

When the source code is translated,


copies of the executable program can be
distributed without the need for the source
code.
[4]

(b) The Java programming language is said to be machine or platform independent.

(i) Describe what is meant by machine independent.

...........................................................................................................................................

.......................................................................................................................................[1]

(ii) Describe how a Java source code program is translated.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2017 9608/13/O/N/17 [Turn over


4

3 A Local Area Network is used by staff in a hospital to access data stored in a Database Management
System (DBMS).

(a) Name two security measures to protect computer systems.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) A frequent task for staff is to key in new patient data from a paper document. The document
includes the patient’s personal ID number.

(i) The Patient ID is a seven digit number. The database designer decides to use a check
digit to verify each foreign key value that a user keys in for a Patient ID.

When a user assigns a primary key value to a Patient ID, the DBMS adds a modulus-11
check digit as an eighth digit. The DBMS uses the weightings 6, 5, 4, 3, 2 and 1 for
calculating the check digit. It uses 6 as the multiplier for the most significant (leftmost)
digit.

Show the calculation of the check digit for the Patient ID with the first six digits 786531.

Complete Patient ID ......................................................................................................[4]

(ii) Name and describe two validation checks that the DBMS could carry out on each
primary key value that a user keys in for a Patient ID.

1 Validation check .........................................................................................................

Description .................................................................................................................

....................................................................................................................................

2 Validation check .........................................................................................................

Description .................................................................................................................

....................................................................................................................................
[4]

© UCLES 2017 9608/13/O/N/17


5

4 (a) The diagram shows the components and buses found inside a typical Personal Computer
(PC).

General purpose
registers

D
Arithmetic Logic
E F
Unit (ALU)

Some components and buses only have labels A to F to identify them.

For each label, choose the appropriate title from the following list. The title for label D is
already given.

• Control bus
• System clock
• Data bus
• Control unit
• Main memory
• Secondary storage

A ...........................................................................................................................................

B ...........................................................................................................................................

C ...........................................................................................................................................

D Address bus

E ...........................................................................................................................................

F ...........................................................................................................................................
[5]

© UCLES 2017 9608/13/O/N/17 [Turn over


6

(b) The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).

Instruction
Op code Op code Explanation
Operand
(mnemonic) (binary)
LDM #n 1100 0001 Immediate addressing. Load number n to ACC.
Direct addressing. Load the contents of the given
LDD <address> 1100 0010
address to ACC.
Relative addressing. Move to the address n locations
LDV #n 1100 0011 from the address of the current instruction. Load the
contents of this address to ACC.
STO <address> 1100 0100 Store the contents of ACC at the given address.
DEC 1100 0101 Decrement the contents of ACC.
Output the character corresponding to the ASCII
OUTCH 1100 0111
character code in ACC.
Following a compare instruction, jump to <address> if
JNE <address> 1110 0110
the compare was False.
JMP <address> 1110 0011 (Unconditionally) jump to the given address.
CMP #n 1110 0100 Compare the contents of ACC with number n.

© UCLES 2017 9608/13/O/N/17


7

Complete the trace table for the following assembly language program.
Label Instruction
StartProg: LDV #CountDown
CMP Num1
ASCII code table (selected codes only)
JNE CarryOn
<Space> 3 B C X
JMP Finish
32 51 66 67 88
CarryOn: OUTCH
LDD CountDown
DEC
STO CountDown
JMP StartProg
Finish: LDM #88
OUTCH
END
CountDown: 15
32
51
67
Num1: 32

Trace table:

ACC CountDown OUTPUT


15
67 C
15

[5]

© UCLES 2017 9608/13/O/N/17 [Turn over


8

(c) The program given in part (b) is to be translated using a two-pass assembler.

The program has been copied here for you. The program now starts with a directive which
tells the assembler to load the first instruction of the program to address 100.
Label
ORG #0100
StartProg: LDV #CountDown
CMP Num1
JNE CarryOn
JMP Finish
CarryOn: OUTCH
LDD CountDown
DEC
STO CountDown
JMP StartProg
Finish: LDM #88
OUTCH
END
CountDown: 15
32
51
67
Num1: 32

© UCLES 2017 9608/13/O/N/17


9

On the first pass of the two-pass process, the assembler adds entries to a symbol table.

The following symbol table shows the first eleven entries, part way through the first pass.

The circular labels show the order in which the assembler made the entries to the symbol
table.

Symbol table

Symbolic address Absolute address

StartProg 1 100 2

CountDown 3 UNKNOWN 4

Num1 5 UNKNOWN 6

CarryOn 7 UNKNOWN 8 104 11

Finish 9 UNKNOWN 10

Explain how the assembler made these entries to the symbol table.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(d) The assembler software must then complete the second pass building up the executable file.

(i) Name the second table needed when the assembler software carries out the second
pass.

.......................................................................................................................................[1]

© UCLES 2017 9608/13/O/N/17 [Turn over


10

The following shows two of the program instructions in machine code.

Machine code
Instruction Binary Hexadecimal
OUTCH 1100 0111 C7
JNE CarryOn A B

Each of the numbers A and B represents the complete instruction in two bytes, one byte for
the op code and one byte for the operand.

(ii) Use the following instruction set to write the numbers for A and B.

A (binary) ........................................................................................................................

B (hexadecimal) .............................................................................................................
[3]

Instruction
Op code Op code Explanation
Operand
(mnemonic) (binary)
LDM #n 1100 0001 Immediate addressing. Load number n to ACC.
Direct addressing. Load the contents of the given
LDD <address> 1100 0010
address to ACC.
Relative addressing. Move to the address n locations
LDV #n 1100 0011 from the address of the current instruction. Load the
contents of this address to ACC.
STO <address> 1100 0100 Store the contents of ACC at the given address.
DEC 1100 0101 Decrement the contents of ACC.
Output the character corresponding to the ASCII
OUTCH 1100 0111
character code in ACC.
Following a compare instruction, jump to <address> if
JNE <address> 1110 0110
the compare was False.
JMP <address> 1110 0011 (Unconditionally) jump to the given address.
CMP #n 1110 0100 Compare the contents of ACC with number n.

© UCLES 2017 9608/13/O/N/17


11

5 A Personal Computer (PC) has a number of input and output devices.

(a) (i) Name three components of a speaker.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

(ii) Explain the basic internal operation of a speaker.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[4]

(b) (i) The user is considering the purchase of a removable device for secondary storage.

Name one suitable device.

.......................................................................................................................................[1]

(ii) Describe two possible uses for this device on a home Personal Computer (PC).

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2017 9608/13/O/N/17 [Turn over


12

6 Raj has joined a software company as a trainee programmer. He was given the company’s Code
of Conduct document during his induction training. The handbook has a section headed ‘Ethical
Behaviour’.

(a) Describe what is meant by ethics.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Raj is assigned to work as a new member of a development team.

In his first week, Raj feels uncomfortable working with one of his colleagues. He is unfamiliar
with the programming language used by the team. Next week, he will be working on the site
of one of the company’s clients with a colleague. Raj is very nervous about working in an
unfamiliar workplace.

Raj has a review with his manager after his first three weeks.

The Code of Conduct document was produced by the Human Resources section. It closely
follows the ACM/IEEE Software Engineering Code of Ethics that uses these eight key
principles:

Public Client and Employer Product Judgement

Management Profession Colleagues Self

There are issues Raj will want to raise with his manager.

• Describe two of these issues.


• Circle the key ACM/IEEE principle this comes under.
• Suggest what action should be taken to demonstrate ethical behaviour.

Issue 1

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

ACM/IEEE principle (Circle one only)

Public Client and Employer Product Judgement

Management Profession Colleagues Self

Possible action .........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2017 9608/13/O/N/17


13

Issue 2

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

ACM/IEEE principle (Circle one only)

Public Client and Employer Product Judgement

Management Profession Colleagues Self

Possible action .........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

Question 7 begins on the next page.

© UCLES 2017 9608/13/O/N/17 [Turn over


14

7 A clinic is staffed by several doctors. The clinic serves thousands of patients. Each day and at any
one time, there is only one doctor in the clinic available for appointments.

The clinic stores patient, doctor and appointment data in a relational database.

(a) (i) Underline the primary key for each table in the following suggested table designs.

PATIENT(PatientID, PatientName, Address, Gender)

DOCTOR(DoctorID, Gender, Qualification)

APPOINTMENT(AppointmentDate, AppointmentTime, DoctorID, PatientID)


[2]

(ii) Complete the following entity-relationship (E-R) diagram for this design.

[2]

(b) The doctors are concerned that many patients make appointments but do not attend them.

Describe the changes to the table designs that could be made to store this information.

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2017 9608/13/O/N/17


15

(c) The doctors are about to set up a new clinic in the neighbouring village, SITE-B.

The original location is identified as SITE-A.

A new table is designed to store the ID of the doctor who is able to work at each site.

DOCTOR-AVAILABILITY(DoctorID, Site)

Five entries stored in the table are:

DoctorID Site
098 SITE-A
074 SITE-A
117 SITE-B
098 SITE-B
033 SITE-B

(i) State what this data shows about the availability of the doctor with the ID of 098.

...........................................................................................................................................

.......................................................................................................................................[1]

(ii) Opening a new clinic in the neighbouring village will not require any additional table for
storing appointments. It will need a change to the existing appointment table design.

Show the revised APPOINTMENT table.

APPOINTMENT( ................................................................................................................

................................................................................................................................... ) [1]

(d) The doctor with the ID of 117 has recently been allocated a new DoctorID of 017.

(i) Write an SQL script to update this doctor’s record in the database.

UPDATE .............................................................................................................................

SET .....................................................................................................................................

WHERE ...............................................................................................................................
[3]

(ii) Describe why this update could cause problems with the existing data stored.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2017 9608/13/O/N/17 [Turn over


16

(e) Write an SQL script to display the date and time of all appointments made by the patient with
the PatientID of 556.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 9608/13/O/N/17


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 5 0 1 3 8 1 0 8 8 7 *

COMPUTER SCIENCE 9608/12


Paper 1 Theory Fundamentals October/November 2017
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 12 printed pages.

DC (ST/SW) 129950/3
© UCLES 2017 [Turn over
2

1 One of the tasks of the operating system (OS) is the management of the main memory of the
computer system.

State and describe three other operating system management tasks.

1 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[6]

© UCLES 2017 9608/12/O/N/17


3

2 (a) The diagram shows three items of software that translate program code.

Draw one line from each context to the correct item of translation software.

Context Item of translation software

The source code is written in a high-level


language. An executable file is produced.

Assembler

The source code uses instructions from


the processor’s instruction set.

Interpreter

The source code and translation


software must both be in main memory at
execution time.

Compiler

A web page contains some JavaScript


code.

[4]

(b) A programmer is developing software and has both a compiler and interpreter for the
high-level language used.

Describe two benefits of using each form of translation software.

(i) Benefits of a compiler

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]
(ii) Benefits of an interpreter

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2017 9608/12/O/N/17 [Turn over


4

3 A Local Area Network is used by school staff who access data stored in a Database Management
System (DBMS).

(a) (i) Explain the difference between security and privacy of data.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

(ii) Give an example for this application where privacy of data is a key concern.

...........................................................................................................................................

.......................................................................................................................................[1]

(b) Name and describe two security measures the Network Manager has in place to protect the
security of the data held in the DBMS.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(c) A task for staff at the start of the school year is to key in new pupil data from a paper document.

The data is entered to a screen form and includes the data verification of some fields.

Describe what is meant by verification.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]
© UCLES 2017 9608/12/O/N/17
5

4 The following diagram shows the components and buses found inside a typical personal computer
(PC).

C D
E

Control unit

Main memory

(a) Some components and buses only have labels A to F to identify them.

For each label, choose the appropriate title from the following list. The title for label D is
already given.

• Control bus
• Address bus
• Arithmetic Logic Unit (ALU)
• General purpose registers
• Secondary storage
• System clock

A ...........................................................................................................................................

B ...........................................................................................................................................

C ...........................................................................................................................................

D Data bus

E ...........................................................................................................................................

F ...........................................................................................................................................
[5]

(b) Clock speed is a factor that affects the performance of a PC. Explain this statement.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2017 9608/12/O/N/17 [Turn over


6

(c) An assembly language program can contain both macros and directives.

(i) Explain what is meant by these terms.

Macro ................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Directive ............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

(ii) Give an example of the use of a directive.

...........................................................................................................................................

.......................................................................................................................................[1]

(d) The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).

Instruction
Op code Explanation
Operand
(mnemonic)
Direct addressing. Load the contents of the given address
LDD <address>
to ACC.
Relative addressing. Move to the address n locations from
LDV #n the address of the current instruction. Load the contents of
this address to ACC.
STO <address> Store the contents of ACC at the given address.
INC Increment the contents of ACC.
Output the character corresponding to the ASCII character
OUTCH
code in ACC.
Following a compare instruction, jump to <address> if the
JPE <address>
compare was True.
JMP <address> Jump to the given address.
CMP #n Compare the contents of ACC with number n.

© UCLES 2017 9608/12/O/N/17


7

Complete the trace table for the following assembly language program.

Label Instruction
StartProg: LDV #Offset
CMP Value
ASCII code table (selected codes only)
JPE EndProg
<Space> 2 A B Y
OUTCH
32 50 65 66 89
LDD Offset
INC
STO Offset
JMP StartProg
EndProg: END
Offset: 10
50
65
89
32
Value: 32

Trace table:

ACC Offset OUTPUT


10
50 2
10

[5]

© UCLES 2017 9608/12/O/N/17 [Turn over


8

(e) The program given in part (d) is to be translated using a two-pass assembler. The program
has been copied here for you.
Label Instruction
StartProg: LDV #Offset
CMP Value
JPE EndProg
OUTCH
LDD Offset
INC
STO Offset
JMP StartProg
EndProg: END
Offset: 10
50
65
89
32
Value: 32

On the first pass, the assembly process adds entries to a symbol table.

The following symbol table shows the first five entries, part way through the first pass.

The circular labels show the order in which the assembler made the entries to the symbol
table.

Complete the symbol table. Use circular labels to show the order in which the assembler
makes the entries.

Symbol table

Symbolic address Relative address

StartProg 1 0 2

Offset 3 UNKNOWN 4

Value 5

[6]

© UCLES 2017 9608/12/O/N/17


9

5 The IEEE Software Engineering Code of Ethics uses eight key principles shown in the right-hand
column of the following diagram.

Tom is employed as a tester with a software company. He is keen to become a trainee programmer.

The middle column in the diagram labels six incidents which have happened to Tom this week.
The table that follows the diagram describes each incident.

IEEE category

Public

Incident A Client and Employer


Ethical
Incident B Product
behaviour

Incident C Judgement

Incident D Management

Unethical Incident E Profession


behaviour
Incident F Colleagues

Self

Incident Description
Tom has received some phishing emails. He reported this to the bank they were
A
supposed to have come from.
B Tom has asked his manager if they will pay for him to attend a programming course.
Tom is testing beta versions of new games software at work. He copies the software on
C
to CD-Rs and sells them to his friends.
D Tom has completed the application forms to join the Chartered Institute for IT.
Tom finds it difficult to work with one of his colleagues. His way of dealing with this has
E
been to refuse to speak with the colleague.
Tom’s manager had considered the testing of a new game was completed. Tom reported
F
to his manager that he thought there were still bugs which needed to be rectified.

(a) Draw a line on the diagram to link each of the six incidents to either ethical behaviour or
unethical behaviour. [2]

(b) Consider each incident you have identified as ethical behaviour.

Draw a line from each incident to indicate the IEEE category it maps to. [4]
© UCLES 2017 9608/12/O/N/17 [Turn over
10

6 (a) A personal computer (PC) is extensively used for a wide range of applications, including the
three shown in the following table.

Write in the table, a suitable input device, output device, or both needed for each application.

Do not give a monitor, keyboard or mouse in your answers.

Application Input device Output device


Capture the text from a paper document, in order
that the text can be word processed
Producing a replica of a small plastic component
from a washing machine
A museum has interactive information facilities
throughout the building
[3]

(b) Explain the basic internal operation of a hard disk drive.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2017 9608/12/O/N/17


11

7 A company takes customer service for its clients very seriously.

The client
• The client names are unique.
A visit
• The company arranges a date for a visit to gather feedback from a client.
• A visit to a client never takes more than one day.
• Over time, the client receives many visits.
Staff (Interviewers)
• One or more staff attend the visit.
• If there is more than one staff member visiting, each performs a separate interview.
Interviews
• Each interview is classified as either ‘general’ or by some specialism, for example, marketing,
customer service or sales.
• A report is produced for each interview, InterviewText.
• Each interview is conducted by a single staff member.

The client, visit, staff and interview data will be stored in a relational database.

(a) (i) Underline the primary key for each table in the following suggested table designs.

STAFF(StaffID, StaffName, Department)

CLIENT(ClientName, Address, Town)

VISIT(ClientName, VisitDate)

INTERVIEW(ClientName, VisitDate, StaffID, SpecialistFocus, InterviewText)


[3]

(ii) For each of the pairs of entities, A, B and C, draw the relationship between the two
entities.

A CLIENT VISIT

B VISIT INTERVIEW

C INTERVIEW STAFF
[3]

© UCLES 2017 9608/12/O/N/17 [Turn over


12

(b) The company decides to produce a visit report, VisitReportText, for each visit made.

This text will be produced from the one or more interview texts obtained at the visit.

State how one or more of the given table designs can be changed to add this attribute.

...................................................................................................................................................

...............................................................................................................................................[1]

(c) Client ABC Holdings are now trading under the name of Albright Holdings.

(i) Write an SQL script to update this client’s record in the database.

UPDATE .............................................................................................................................

SET ....................................................................................................................................

WHERE ...............................................................................................................................
[3]
(ii) Describe why this update could cause problems with the existing data stored.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(d) Write an SQL script to display the Staff ID of each member of staff who performed an interview
when they visited New Age Toys on 13/10/2016.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(e) At present, all interviews are performed in the UK. Many clients now operate in other countries
in Europe. The company wants to perform interviews with the client’s staff in other countries.
Not all interview staff are willing to travel outside of the UK.

State how one or more of the table designs should be revised to store this information.

...................................................................................................................................................

...............................................................................................................................................[1]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 9608/12/O/N/17


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 2 8 9 8 7 7 5 3 0 5 *

COMPUTER SCIENCE 9608/11


Paper 1 Theory Fundamentals October/November 2017
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.

The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 16 printed pages.

DC (ST/JG) 129947/3
© UCLES 2017 [Turn over
2

1 (a) Each of the following bytes represents an integer in two’s complement form.

State the denary value.

(i) 0111 0111 Denary .................................................. [1]

(ii) 1000 1000 Denary .................................................. [1]

(iii) Express the following integer in two’s complement form.

-17

[1]

(iv) State in denary, the range of integer values that it is possible to represent in two’s
complement integers using a single byte.

Lowest value ..................................................

Highest value .................................................. [1]

(b) (i) Convert the following denary integer into Binary Coded Decimal (BCD).

653

.......................................................................................................................................[1]

(ii) A 3-digit BCD representation has been incorrectly copied. It is shown as:

0 1 0 0 1 1 1 0 0 0 1 0

State how you can recognise that this is not a valid BCD representation.

...........................................................................................................................................

.......................................................................................................................................[1]

(iii) Describe a practical application where BCD is used.

...........................................................................................................................................

.......................................................................................................................................[1]

© UCLES 2017 9608/11/O/N/17


3

2 (a) The diagram shows three items of software that translate program code.

Draw one line from each context to the correct item of translation software.

Context Item of translation software

A web page contains a client-side script.

Assembler

Each instruction in the source code


consists of an op code and an operand.

Interpreter

The source code is required at run-time.

Compiler

When the source code is translated,


copies of the executable program can be
distributed without the need for the source
code.
[4]

(b) The Java programming language is said to be machine or platform independent.

(i) Describe what is meant by machine independent.

...........................................................................................................................................

.......................................................................................................................................[1]

(ii) Describe how a Java source code program is translated.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2017 9608/11/O/N/17 [Turn over


4

3 A Local Area Network is used by staff in a hospital to access data stored in a Database Management
System (DBMS).

(a) Name two security measures to protect computer systems.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) A frequent task for staff is to key in new patient data from a paper document. The document
includes the patient’s personal ID number.

(i) The Patient ID is a seven digit number. The database designer decides to use a check
digit to verify each foreign key value that a user keys in for a Patient ID.

When a user assigns a primary key value to a Patient ID, the DBMS adds a modulus-11
check digit as an eighth digit. The DBMS uses the weightings 6, 5, 4, 3, 2 and 1 for
calculating the check digit. It uses 6 as the multiplier for the most significant (leftmost)
digit.

Show the calculation of the check digit for the Patient ID with the first six digits 786531.

Complete Patient ID ......................................................................................................[4]

(ii) Name and describe two validation checks that the DBMS could carry out on each
primary key value that a user keys in for a Patient ID.

1 Validation check .........................................................................................................

Description .................................................................................................................

....................................................................................................................................

2 Validation check .........................................................................................................

Description .................................................................................................................

....................................................................................................................................
[4]

© UCLES 2017 9608/11/O/N/17


5

4 (a) The diagram shows the components and buses found inside a typical Personal Computer
(PC).

General purpose
registers

D
Arithmetic Logic
E F
Unit (ALU)

Some components and buses only have labels A to F to identify them.

For each label, choose the appropriate title from the following list. The title for label D is
already given.

• Control bus
• System clock
• Data bus
• Control unit
• Main memory
• Secondary storage

A ...........................................................................................................................................

B ...........................................................................................................................................

C ...........................................................................................................................................

D Address bus

E ...........................................................................................................................................

F ...........................................................................................................................................
[5]

© UCLES 2017 9608/11/O/N/17 [Turn over


6

(b) The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).

Instruction
Op code Op code Explanation
Operand
(mnemonic) (binary)
LDM #n 1100 0001 Immediate addressing. Load number n to ACC.
Direct addressing. Load the contents of the given
LDD <address> 1100 0010
address to ACC.
Relative addressing. Move to the address n locations
LDV #n 1100 0011 from the address of the current instruction. Load the
contents of this address to ACC.
STO <address> 1100 0100 Store the contents of ACC at the given address.
DEC 1100 0101 Decrement the contents of ACC.
Output the character corresponding to the ASCII
OUTCH 1100 0111
character code in ACC.
Following a compare instruction, jump to <address> if
JNE <address> 1110 0110
the compare was False.
JMP <address> 1110 0011 (Unconditionally) jump to the given address.
CMP #n 1110 0100 Compare the contents of ACC with number n.

© UCLES 2017 9608/11/O/N/17


7

Complete the trace table for the following assembly language program.
Label Instruction
StartProg: LDV #CountDown
CMP Num1
ASCII code table (selected codes only)
JNE CarryOn
<Space> 3 B C X
JMP Finish
32 51 66 67 88
CarryOn: OUTCH
LDD CountDown
DEC
STO CountDown
JMP StartProg
Finish: LDM #88
OUTCH
END
CountDown: 15
32
51
67
Num1: 32

Trace table:

ACC CountDown OUTPUT


15
67 C
15

[5]

© UCLES 2017 9608/11/O/N/17 [Turn over


8

(c) The program given in part (b) is to be translated using a two-pass assembler.

The program has been copied here for you. The program now starts with a directive which
tells the assembler to load the first instruction of the program to address 100.
Label
ORG #0100
StartProg: LDV #CountDown
CMP Num1
JNE CarryOn
JMP Finish
CarryOn: OUTCH
LDD CountDown
DEC
STO CountDown
JMP StartProg
Finish: LDM #88
OUTCH
END
CountDown: 15
32
51
67
Num1: 32

© UCLES 2017 9608/11/O/N/17


9

On the first pass of the two-pass process, the assembler adds entries to a symbol table.

The following symbol table shows the first eleven entries, part way through the first pass.

The circular labels show the order in which the assembler made the entries to the symbol
table.

Symbol table

Symbolic address Absolute address

StartProg 1 100 2

CountDown 3 UNKNOWN 4

Num1 5 UNKNOWN 6

CarryOn 7 UNKNOWN 8 104 11

Finish 9 UNKNOWN 10

Explain how the assembler made these entries to the symbol table.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(d) The assembler software must then complete the second pass building up the executable file.

(i) Name the second table needed when the assembler software carries out the second
pass.

.......................................................................................................................................[1]

© UCLES 2017 9608/11/O/N/17 [Turn over


10

The following shows two of the program instructions in machine code.

Machine code
Instruction Binary Hexadecimal
OUTCH 1100 0111 C7
JNE CarryOn A B

Each of the numbers A and B represents the complete instruction in two bytes, one byte for
the op code and one byte for the operand.

(ii) Use the following instruction set to write the numbers for A and B.

A (binary) ........................................................................................................................

B (hexadecimal) .............................................................................................................
[3]

Instruction
Op code Op code Explanation
Operand
(mnemonic) (binary)
LDM #n 1100 0001 Immediate addressing. Load number n to ACC.
Direct addressing. Load the contents of the given
LDD <address> 1100 0010
address to ACC.
Relative addressing. Move to the address n locations
LDV #n 1100 0011 from the address of the current instruction. Load the
contents of this address to ACC.
STO <address> 1100 0100 Store the contents of ACC at the given address.
DEC 1100 0101 Decrement the contents of ACC.
Output the character corresponding to the ASCII
OUTCH 1100 0111
character code in ACC.
Following a compare instruction, jump to <address> if
JNE <address> 1110 0110
the compare was False.
JMP <address> 1110 0011 (Unconditionally) jump to the given address.
CMP #n 1110 0100 Compare the contents of ACC with number n.

© UCLES 2017 9608/11/O/N/17


11

5 A Personal Computer (PC) has a number of input and output devices.

(a) (i) Name three components of a speaker.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

(ii) Explain the basic internal operation of a speaker.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[4]

(b) (i) The user is considering the purchase of a removable device for secondary storage.

Name one suitable device.

.......................................................................................................................................[1]

(ii) Describe two possible uses for this device on a home Personal Computer (PC).

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2017 9608/11/O/N/17 [Turn over


12

6 Raj has joined a software company as a trainee programmer. He was given the company’s Code
of Conduct document during his induction training. The handbook has a section headed ‘Ethical
Behaviour’.

(a) Describe what is meant by ethics.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Raj is assigned to work as a new member of a development team.

In his first week, Raj feels uncomfortable working with one of his colleagues. He is unfamiliar
with the programming language used by the team. Next week, he will be working on the site
of one of the company’s clients with a colleague. Raj is very nervous about working in an
unfamiliar workplace.

Raj has a review with his manager after his first three weeks.

The Code of Conduct document was produced by the Human Resources section. It closely
follows the ACM/IEEE Software Engineering Code of Ethics that uses these eight key
principles:

Public Client and Employer Product Judgement

Management Profession Colleagues Self

There are issues Raj will want to raise with his manager.

• Describe two of these issues.


• Circle the key ACM/IEEE principle this comes under.
• Suggest what action should be taken to demonstrate ethical behaviour.

Issue 1

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

ACM/IEEE principle (Circle one only)

Public Client and Employer Product Judgement

Management Profession Colleagues Self

Possible action .........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2017 9608/11/O/N/17


13

Issue 2

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

ACM/IEEE principle (Circle one only)

Public Client and Employer Product Judgement

Management Profession Colleagues Self

Possible action .........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

Question 7 begins on the next page.

© UCLES 2017 9608/11/O/N/17 [Turn over


14

7 A clinic is staffed by several doctors. The clinic serves thousands of patients. Each day and at any
one time, there is only one doctor in the clinic available for appointments.

The clinic stores patient, doctor and appointment data in a relational database.

(a) (i) Underline the primary key for each table in the following suggested table designs.

PATIENT(PatientID, PatientName, Address, Gender)

DOCTOR(DoctorID, Gender, Qualification)

APPOINTMENT(AppointmentDate, AppointmentTime, DoctorID, PatientID)


[2]

(ii) Complete the following entity-relationship (E-R) diagram for this design.

[2]

(b) The doctors are concerned that many patients make appointments but do not attend them.

Describe the changes to the table designs that could be made to store this information.

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2017 9608/11/O/N/17


15

(c) The doctors are about to set up a new clinic in the neighbouring village, SITE-B.

The original location is identified as SITE-A.

A new table is designed to store the ID of the doctor who is able to work at each site.

DOCTOR-AVAILABILITY(DoctorID, Site)

Five entries stored in the table are:

DoctorID Site
098 SITE-A
074 SITE-A
117 SITE-B
098 SITE-B
033 SITE-B

(i) State what this data shows about the availability of the doctor with the ID of 098.

...........................................................................................................................................

.......................................................................................................................................[1]

(ii) Opening a new clinic in the neighbouring village will not require any additional table for
storing appointments. It will need a change to the existing appointment table design.

Show the revised APPOINTMENT table.

APPOINTMENT( ................................................................................................................

................................................................................................................................... ) [1]

(d) The doctor with the ID of 117 has recently been allocated a new DoctorID of 017.

(i) Write an SQL script to update this doctor’s record in the database.

UPDATE .............................................................................................................................

SET .....................................................................................................................................

WHERE ...............................................................................................................................
[3]

(ii) Describe why this update could cause problems with the existing data stored.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2017 9608/11/O/N/17 [Turn over


16

(e) Write an SQL script to display the date and time of all appointments made by the patient with
the PatientID of 556.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 9608/11/O/N/17


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 7 0 9 6 0 6 9 4 0 5 *

COMPUTER SCIENCE 9608/13


Paper 1 Theory Fundamentals May/June 2017
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 15 printed pages and 1 blank page.

DC (SR/FC) 146091
© UCLES 2017 [Turn over
2

1 A hospital is divided into two areas, Area A and Area B. Each area has several wards. All the ward
names are different.

A number of nurses are based in Area A. These nurses always work on the same ward. Each
nurse has a unique Nurse ID of STRING data type.

A-NURSE A-WARD

(a) Describe the relationship shown above.

...................................................................................................................................................

...............................................................................................................................................[1]

(b) A relational database is created to store the ward and nurse data. The two table designs for
Area A are:

A-WARD(WardName, NumberOfBeds)

A-NURSE(NurseID, FirstName, FamilyName, ...........................................................)

(i) Complete the design for the A-NURSE table. [1]

(ii) Explain how the relationship in part (a) is implemented.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(c) In Area B of the hospital, there are a number of wards and a number of nurses.

Each Area B ward has a specialism.

Each Area B nurse has a specialism.

A nurse can be asked to work in any of the Area B wards where their specialism matches with
the ward specialism.

The relationship for Area B of the hospital is:

B-NURSE B-WARD

(i) Explain what the degree of relationship is between the entities B-NURSE and B-WARD.

...........................................................................................................................................

.......................................................................................................................................[1]

© UCLES 2017 9608/13/M/J/17


3

(ii) The design for the Area B data is as follows:

B-NURSE(NurseID, FirstName, FamilyName, Specialism)

B-WARD(WardName, NumberOfBeds, Specialism)

B-WARD-NURSE( ............................................................................................................ )

Complete the attributes for the third table. Underline its primary key. [2]

(iii) Draw the relationships on the entity-relationship (E-R) diagram.

B-NURSE B-WARD

B-WARD-NURSE

[2]

(d) Use the table designs in part (c)(ii).

(i) Write an SQL query to display the Nurse ID and family name for all Area B nurses with a
specialism of ‘THEATRE’.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

(ii) Fatima Woo is an Area B nurse with the nurse ID of 076. She has recently married, and
her new family name is Chi.

Write an SQL command to update her record.

UPDATE .............................................................................................................................

SET ....................................................................................................................................

WHERE ...............................................................................................................................
[3]

© UCLES 2017 9608/13/M/J/17 [Turn over


4

2 (a) (i) The following sequence of steps (1 to 7) describe how a single page is printed on a laser
printer.

The statements A, B, C and D are used to complete the sequence.

The paper passes through a fuser, which heats up the paper. The toner melts and
A
forms a permanent image on the paper.

B The electrical charge is removed from the drum and the excess toner is collected.

C The image is converted on the drum into an electrostatic charge.

The oppositely-charged paper picks up the toner particles from the drum. After
D
picking up the toner, the paper is discharged to stop it clinging to the drum.

Complete the sequence by writing one of the letters A, B, C or D on the appropriate row.

1. A laser beam and a rotating mirror are used to draw an image of the page on the
photosensitive drum.

2. .........................

3. Electrostatic charge attracts toner.

4. The charged paper is rolled against the drum.

5. .........................

6. .........................

7. ......................... [3]

(ii) A computer user has a laser printer to print letters and documents. The user also prints
digital photographs taken using a digital camera.

State the most suitable type of printer for printing the photographs.

.......................................................................................................................................[1]

(b) The user is considering the purchase of a new laptop computer. She has read many product
reviews and knows that there are different types of internal secondary storage available.

List two options for internal secondary storage.

Option 1 ....................................................................................................................................

Option 2 ....................................................................................................................................

Describe one advantage of one of the options.

Advantage of choosing option 1 / 2 (circle)


...................................................................................................................................................

...............................................................................................................................................[3]
© UCLES 2017 9608/13/M/J/17
5

Question 3 begins on page 6.

© UCLES 2017 9608/13/M/J/17 [Turn over


6

3 (a) A computer has a microphone and captures a voice recording using sound recording software.

Before making a recording, the user can select the sampling rate.

Define the term sampling rate. Explain how the sampling rate will influence the accuracy of
the digitised sound.

Sampling rate ...........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Explanation ...............................................................................................................................

...................................................................................................................................................
[2]

(b) The computer also has bitmap software.

(i) Define the terms pixel and screen resolution.

Pixel ...................................................................................................................................

...........................................................................................................................................

Screen resolution ..............................................................................................................

...........................................................................................................................................
[2]

(ii) A picture has been drawn and is saved as a monochrome bitmap image.

State how many pixels are stored in one byte.

.......................................................................................................................................[1]

(iii) A second picture has width 2048 pixels and height 512 pixels. It is saved as a 256-colour
image.

Calculate the file size in kilobytes.

Show your working.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

© UCLES 2017 9608/13/M/J/17


7

(iv) The actual bitmap file size will be larger than your calculated value.

State another data item that the bitmap file stores in addition to the pixel data.

...........................................................................................................................................

.......................................................................................................................................[1]

© UCLES 2017 9608/13/M/J/17 [Turn over


8

4 The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC) and an Index Register (IX).

Instruction
Op code Op code Explanation
Operand
(mnemonic) (binary)
Immediate addressing. Load the denary number n to
LDM #n 0000 0001
ACC.
Direct addressing. Load the contents of the location
LDD <address> 0000 0010
at the given address to ACC.
Indirect addressing. At the given address is the
LDI <address> 0000 0101 address to be used. Load the contents of this second
address to ACC.
Indexed addressing. Form the address from
<address> + the contents of the Index Register
LDX <address> 0000 0110
(IX). Copy the contents of this calculated address to
ACC.
LDR #n 0000 0111 Immediate addressing. Load number n to IX.
STO <address> 0000 1111 Store the contents of ACC at the given address.

The following diagram shows the contents of a section of main memory and the Index Register (IX).

(a) Show the contents of the Accumulator (ACC) after each instruction is executed.

IX 0 0 0 0 0 0 1 1

Main
(i) LDM #500
Memory
Address contents
ACC ................................................................[1]
495 13
(ii) LDD 500
496 86
ACC ................................................................[1] 497 92

(iii) LDX 500 498 486


499 489
ACC ................................................................[1]
500 496
(iv) LDI 500 501 497
ACC ................................................................[1] 502 499
503 502

© UCLES 2017 9608/13/M/J/17


9

(b) Each machine code instruction is encoded as 16-bits (8-bit op code followed by an 8-bit
operand).

Write the machine code for the following instructions:

LDM #17

LDX #97

[3]

(c) Using an 8-bit operand, state the maximum number of memory locations, in denary, that can
be directly addressed.

...............................................................................................................................................[1]

(d) Computer scientists often write binary representations in hexadecimal.

(i) Write the hexadecimal representation for this instruction:

0 0 0 0 0 1 1 1 1 1 0 0 0 0 1 0

.......................................................................................................................................[2]

(ii) A second instruction has been written in hexadecimal as:

05 3F

Write the equivalent assembly language instruction, with the operand in denary.

.......................................................................................................................................[2]

© UCLES 2017 9608/13/M/J/17 [Turn over


10

5 A computer receives data from a remote data logger. Each data block is a group of 8 bytes.
A block is made up of seven data bytes and a parity byte.

Each data byte has a parity bit using odd parity. The parity byte also uses odd parity.

The following table shows a data block before transmission. Bit position 0 is the parity bit.

Bit position
7 6 5 4 3 2 1 0
1 1 0 0 1 1 0 1
0 0 1 0 0 0 0 0
1 0 0 1 1 1 0 A
1 1 0 0 0 0 1 0 Data bytes
1 1 0 0 0 0 1 0
1 1 0 0 0 1 1 B
0 0 0 0 0 0 0 0

0 1 1 0 1 1 0 0 Parity byte

(a) (i) Describe how the data logger calculates the parity bit for each of the bytes in the data
block.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) State the two missing parity bits labelled A and B.

A = ..............................

B = .............................. [1]

(iii) Describe how the computer uses the parity byte to perform a further check on the
received data bytes.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2017 9608/13/M/J/17


11

(b) (i) A second data block is received as shown in the following table. There are errors in this
data block.

Identify and then circle two bits in the table which must be changed to remove the errors.

Bit position
7 6 5 4 3 2 1 0
1 0 0 0 1 1 0 0
0 0 1 0 0 0 0 0
0 0 1 1 0 1 0 1
1 1 1 1 0 0 0 1
1 1 0 0 0 0 1 0
0 0 1 0 0 1 0 0
0 0 0 0 0 0 0 1

0 1 0 1 1 0 0 0
[2]

(ii) Explain how you arrived at your answers for part (b)(i).

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

© UCLES 2017 9608/13/M/J/17 [Turn over


12

6 (a) The operating system (OS) contains code for performing various management tasks.

The appropriate code is run when the user performs various actions.

Draw a line to link each OS management task to the appropriate user action.

OS management task Action

Main memory The user moves the mouse on


management the desktop

Input/Output The user closes the


management spreadsheet program

The user selects the Save


Secondary storage
command to save their
management
spreadsheet file

Human computer The user selects the Print


interface command to output their
management spreadsheet document
[3]

(b) A user has the following issues with the use of his PC.

State the utility software which should provide a solution.

(i) The hard disk stores a large number of video files. The computer frequently runs out of
storage space.

Utility software solution .................................................................................................[1]

(ii) The user is unable to find an important document. He thinks it was deleted in error some
weeks ago. This must not happen again.

Utility software solution .................................................................................................[1]

(iii) The operating system reports ‘Bad sector’ errors.

Utility software solution .................................................................................................[1]

(iv) There have been some unexplained images and advertisements appearing on the
screen. The user suspects it is malware.

Utility software solution .................................................................................................[1]

© UCLES 2017 9608/13/M/J/17


13

7 The design of a web-based application can require the use of client-side scripting.

(a) Describe what is meant by client-side scripting.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) A user requests a web page by keying the Uniform Resource Locator (URL) into the address
bar of their web browser.

The requested page contains a client-side script.

Describe the sequence of steps leading to the display of the web page on the computer
screen.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2017 9608/13/M/J/17 [Turn over


14

(c) A web page used for data capture consists of:

• two text boxes for the entry of:


• a product code
• the number of items to be purchased.
• a button which is clicked when the user wants to submit this order.

Study the following web page.

1 <html>
2 <head>
3 <title>Untitled Document</title>
4 <script language="JavaScript">
5
6 function myButton_onmousedown()
7 {
8 var Message1 = "ERROR – Order refused";
9 var Message2 = "Product code OK";
10 var x = document.forms["form1"]["txtProductCode"].value;
11 if (x == "")
12 {
13 alert(Message1)
14 }
15 else
16 {
17 alert(Message2)
18 }
19 }
20 </script>
21
22 </head>
23 <body>
24 <form name = form1>
25 <label>Product code: </label>
26 <input type="text" name="txtProductCode" >
27 <label>Number: </label>
28 <input type="text" name="txtNumber" size = "5" >
29 <p>
30 <label>Submit order: </label>
31 <input type="button" name="btnSubmit" Value = "Submit"
32
33 onMouseDown = "myButton_onmousedown()" >
34 </p>
35 </form>
36
37 </body>
38 </html>

© UCLES 2017 9608/13/M/J/17


15

(i) The developer has used three variables in the JavaScript code. State the identifiers used.

1 ..................................................................

2 ..................................................................

3 .................................................................. [2]

(ii) The button has an event whose identifier is onMouseDown. When the submit button is
clicked, some code is executed.

State the line numbers that contain this code.

From line .............................. to line .............................. [1]

(iii) The JavaScript code uses a selection statement.

State the line number that contains the condition.

Line number: ................................................................. [1]

(iv) Describe the purpose of the validation check that the code performs.

...........................................................................................................................................

.......................................................................................................................................[1]

(v) Name and describe two other types of validation check that could be appropriate for this
data capture form.

Validation check: ...............................................................................................................

Description ........................................................................................................................

...........................................................................................................................................

Validation check: ...............................................................................................................

Description ........................................................................................................................

...........................................................................................................................................
[4]

© UCLES 2017 9608/13/M/J/17


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 9608/13/M/J/17


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 0 2 1 5 2 4 6 1 4 4 *

COMPUTER SCIENCE 9608/12


Paper 1 Theory Fundamentals May/June 2017
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 13 printed pages and 3 blank pages.

DC (CE/FC) 129908/3
© UCLES 2017 [Turn over
2

1 Some shops belong to the Rainbow Retail buying group. They buy their goods from one or more
suppliers.

Each shop has:

• a unique shop ID
• a single retail specialism (for example, food, electrical, garden).

Each supplier has:

• a unique supplier ID
• a similar single specialism recorded.

Rainbow Retail creates a relational database to record data about the shops and their suppliers.

The entity-relationship (E-R) diagram for the relationship between the SHOP and SUPPLIER tables
is shown.

SHOP SUPPLIER

(a) Explain what the degree of relationship is between the entities SHOP and SUPPLIER.

...................................................................................................................................................

...............................................................................................................................................[1]

The database design is as follows:

SHOP(ShopID, ShopName, Location, RetailSpecialism)

SUPPLIER(SupplierID, SupplierName, ContactPerson, RetailSpecialism)

SHOP-SUPPLIER(ShopID, SupplierID)

The SHOP–SUPPLIER table stores the suppliers that each shop has previously used.

Primary keys are not shown.

(b) (i) Label the entities and draw the relationships to complete the revised E-R diagram.

SUPPLIER

[3]

© UCLES 2017 9608/12/M/J/17


3

(ii) Complete the following table to show for each database table:

• the primary key


• the foreign key(s) (if any):
° Each table may contain none, one or more foreign key(s).
° For a table with no foreign key, write ‘None’.
• an explanation for the use of any foreign key.

Table Primary key Foreign key(s) Explanation


(if any)

SHOP

SUPPLIER

SHOP–SUPPLIER

[5]

(iii) The database designer has implemented SUPPLIER.ContactPerson as a secondary


key.

Describe the reason for this.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(c) (i) Write an SQL query to display the shop ID and location of all shops with a ‘GROCERY’
specialism.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

(ii) The existing shop with ID 8765 has just used the existing supplier SUP89 for the first
time.

Write an SQL script to add this data to the database.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

© UCLES 2017 9608/12/M/J/17 [Turn over


4

2 (a) The first column of the following table gives features of different types of printer.

Put a tick (3) in the cells to show which features describe a laser and an inkjet printer.

Type of printer
Laser Inkjet
Impact printer
Non-impact printer
Line printer
Page printer
[2]

(b) Two of the components of an inkjet printer are a stepper motor and a print head.

Describe how each component is used when printing a page.

(i) Print head ..........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[5]

(ii) Stepper motor

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2017 9608/12/M/J/17


5

(c) A student has an old working laptop computer. It has a small capacity internal disk drive with
almost all the storage space taken up by the operating system and application programs.

She needs to buy an external storage device to store her data files.

(i) List two suitable devices.

Device 1 ............................................................................................................................

Device 2 ............................................................................................................................
[2]

(ii) Describe one advantage of choosing one of the devices.

Advantage of choosing device 1 / 2 (circle)

...........................................................................................................................................

.......................................................................................................................................[1]

© UCLES 2017 9608/12/M/J/17 [Turn over


6

3 (a) A computer has a microphone and captures a voice recording using sound editing software.

The user can select the sampling resolution before making a recording.

Define the term sampling resolution. Explain how the sampling resolution will affect the
accuracy of the digitised sound.

Sampling resolution ..................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Explanation ...............................................................................................................................

...................................................................................................................................................
[3]

(b) The computer also has bitmap software.

(i) Define the term image resolution.

...........................................................................................................................................

.......................................................................................................................................[1]

(ii) A picture is drawn and is saved as a 16-colour bitmap image.

State how many bits are used to encode the data for one pixel.

.......................................................................................................................................[1]

(iii) A second picture has width 8192 pixels and height 256 pixels. It is saved as a 256-colour
bitmap.

Calculate the file size in kilobytes.

Show your working.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

(iv) The actual bitmap file size will be larger than your calculated value as a bitmap file has a
file header.

State two items of data that are stored in the file header.

1 ........................................................................................................................................

2 ....................................................................................................................................[2]
© UCLES 2017 9608/12/M/J/17
7

4 (a) (i) Explain why a personal computer (PC) needs an operating system (OS).

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) One of the tasks carried out by the OS is the management of the use of the processor.

Name and describe two other management tasks that the OS performs.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

(b) A user has the following issues with the use of their personal computer (PC).

For each case, state the utility software which should provide a solution.

(i) The user wants to send a large file as an attachment to an email. The user knows that
the recipient’s Internet Service Provider (ISP) has a limit of 2MB for file attachments.

Utility software solution: ................................................................................................[1]

(ii) The user is writing a book and is worried that the document files could get damaged or
deleted.

Utility software solution: ................................................................................................[1]

(iii) The computer has recently been slow to load large files. The user has deleted a large
number of small files to try to solve the problem. A friend has advised that there is a
procedure which should be regularly carried out to reorganise file storage on the hard
disk.

Utility software solution: ................................................................................................[1]

(iv) The user clicked on an attachment in an unsolicited email. Since then, the computer has
shown some unexplained behaviours.

Utility software solution: ................................................................................................[1]

© UCLES 2017 9608/12/M/J/17 [Turn over


8

5 The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).

Instruction
Op code Op code Explanation
Operand
(mnemonic) (binary)
Direct addressing. Load the contents of
LDD <address> 0001 0011 the location at the given address to the
Accumulator (ACC).
Indirect addressing. The address to be used is
LDI <address> 0001 0100 at the given address. Load the contents of this
second address to ACC.
Indexed addressing. Form the address from
<address> + the contents of the Index
LDX <address> 0001 0101
Register. Copy the contents of this calculated
address to ACC.
Immediate addressing. Load the denary
LDM #n 0001 0010
number n to ACC.
Immediate addressing. Load denary number n
LDR #n 0001 0110
to the Index Register (IX).
Store the contents of ACC at the given
STO <address> 0000 0111
address.

The following diagram shows the contents of a section of main memory and the Index Register (IX).

(a) Show the contents of the Accumulator (ACC) after each instruction is executed.

IX 0 0 0 0 0 1 1 0

(i) LDD 355


Main
ACC .................................................. [1] memory
Address contents
(ii) LDM #355
350
ACC .................................................. [1] 351 86

(iii) LDX 351 352


353
ACC .................................................. [1]
354
(iv) LDI 355 355 351
ACC .................................................. [1] 356
357 22
358

© UCLES 2017 9608/12/M/J/17


9

(b) Each machine code instruction is encoded as 16 bits (8-bit op code followed by an 8-bit
operand).

Write the machine code for these instructions:

LDM #67

LDX #7

[3]

(c) Computer scientists often write binary representations in hexadecimal.

(i) Write the hexadecimal representation for the following instruction.

0 0 0 1 0 1 0 0 0 1 0 1 1 1 1 0

.......................................................................................................................................[2]

(ii) A second instruction has been written in hexadecimal as:

16 4D

Write the assembly language for this instruction with the operand in denary.

.......................................................................................................................................[2]

© UCLES 2017 9608/12/M/J/17 [Turn over


10

6 Downloading a file from a website is an example of a client-server application.

(a) Describe what is meant by the term client-server for this application.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) The following sequence of steps (1 to 5) describes what happens when someone uses their
personal computer (PC) to request a web page. The web page consists of HTML tags and
text content only. Four of the statements from A, B, C, D, E and F are used to complete the
sequence.

A Browser software interprets the script, renders the page and displays.
B Browser software renders the page and displays.
C Browser software compiles the script, renders the page and displays.
D The web server retrieves the page.
E The Domain Name Service (DNS) uses the domain name from the
browser to look up the IP address of the web server.
F The web server sends the web page content to the browser.

Write one of the letters A to F in the appropriate row to complete the sequence.

1. The user keys in the Uniform Resource Locator (URL) into the browser software.

2. ....................................

3. ....................................

4. ....................................

5. ....................................
[4]

© UCLES 2017 9608/12/M/J/17


11

Question 6(c) begins on the next page.

© UCLES 2017 9608/12/M/J/17 [Turn over


12

(c) The following web page used for data capture consists of:

• two text boxes for the entry of:


° a race runner’s ID code
° their finishing position in a race.
• a button that the user clicks to submit this runner’s result.

1 <html>
2 <head>
3 <title>Untitled Document</title>
4 <script language="JavaScript">
5
6 function myButton_onmousedown()
7 {
8 var Output1 = "Runner ID OK";
9 var Output2 = "ERROR – entry refused";
10
11 var Runner ID = document.forms["form1"]["txtRunnerID"].value;
12 // || in Javascript is the 'OR' operator
13 if (RunnerID.substr(0,3) == "VAR" || RunnerID.substr(0,3) == "CAM")
14 {
15 alert(Output1)
16 }
17 else
18 {
19 alert(Output2)
20 }
21 }
22 </script>
23
24 </head>
25 <body>
26 <form name = form1>
27 <label>Runner ID: </label>
28 <input type="text" name="txtRunnerID" >
29 <label>Position: </label>
30 <input type="text" name="txtPosition" size = "5" >
31 <p>
32 <label>Save data: </label>
33 <input type="button" name="btnSubmit" Value = "Submit"
34
35 onMouseDown = "myButton_onmousedown()" >
36 </p>
37 </form>
38
39 </body>
40 </html>

© UCLES 2017 9608/12/M/J/17


13

(i) The developer has used three variables in the JavaScript code. State the identifiers
used.

1. ....................................

2. ....................................

3. .................................... [2]

(ii) The button has an event whose identifier is onMouseDown. When the mouse button is
clicked, some code is run.

State the line numbers which contain this code.

From line .................................... to line .................................... [1]

(iii) The JavaScript code uses a selection statement.

State the line number which contains its condition.

Line number: .................................... [1]

(iv) Describe the purpose of the validation check that the code performs.

...........................................................................................................................................

.......................................................................................................................................[1]

(v) Name and describe two other types of validation check which could be appropriate for
this data capture form.

Validation check: ...............................................................................................................

Description ........................................................................................................................

...........................................................................................................................................

Validation check: ...............................................................................................................

Description ........................................................................................................................

...........................................................................................................................................
[4]

© UCLES 2017 9608/12/M/J/17


14

BLANK PAGE

© UCLES 2017 9608/12/M/J/17


15

BLANK PAGE

© UCLES 2017 9608/12/M/J/17


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 9608/12/M/J/17


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 9 4 5 0 3 2 9 4 9 1 *

COMPUTER SCIENCE 9608/11


Paper 1 Theory Fundamentals May/June 2017
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 15 printed pages and 1 blank page.

DC (NH/FC) 129906/4
© UCLES 2017 [Turn over
2

1 A hospital is divided into two areas, Area A and Area B. Each area has several wards. All the ward
names are different.

A number of nurses are based in Area A. These nurses always work on the same ward. Each
nurse has a unique Nurse ID of STRING data type.

A-NURSE A-WARD

(a) Describe the relationship shown above.

...................................................................................................................................................

...............................................................................................................................................[1]

(b) A relational database is created to store the ward and nurse data. The two table designs for
Area A are:

A-WARD(WardName, NumberOfBeds)

A-NURSE(NurseID, FirstName, FamilyName, ...........................................................)

(i) Complete the design for the A-NURSE table. [1]

(ii) Explain how the relationship in part (a) is implemented.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(c) In Area B of the hospital, there are a number of wards and a number of nurses.

Each Area B ward has a specialism.

Each Area B nurse has a specialism.

A nurse can be asked to work in any of the Area B wards where their specialism matches with
the ward specialism.

The relationship for Area B of the hospital is:

B-NURSE B-WARD

(i) Explain what the degree of relationship is between the entities B-NURSE and B-WARD.

...........................................................................................................................................

.......................................................................................................................................[1]

© UCLES 2017 9608/11/M/J/17


3

(ii) The design for the Area B data is as follows:

B-NURSE(NurseID, FirstName, FamilyName, Specialism)

B-WARD(WardName, NumberOfBeds, Specialism)

B-WARD-NURSE( ............................................................................................................ )

Complete the attributes for the third table. Underline its primary key. [2]

(iii) Draw the relationships on the entity-relationship (E-R) diagram.

B-NURSE B-WARD

B-WARD-NURSE

[2]

(d) Use the table designs in part (c)(ii).

(i) Write an SQL query to display the Nurse ID and family name for all Area B nurses with a
specialism of ‘THEATRE’.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

(ii) Fatima Woo is an Area B nurse with the nurse ID of 076. She has recently married, and
her new family name is Chi.

Write an SQL command to update her record.

UPDATE .............................................................................................................................

SET ....................................................................................................................................

WHERE ...............................................................................................................................
[3]

© UCLES 2017 9608/11/M/J/17 [Turn over


4

2 (a) (i) The following sequence of steps (1 to 7) describe how a single page is printed on a laser
printer.

The statements A, B, C and D are used to complete the sequence.

The paper passes through a fuser, which heats up the paper. The toner melts and
A
forms a permanent image on the paper.

B The electrical charge is removed from the drum and the excess toner is collected.

C The image is converted on the drum into an electrostatic charge.

The oppositely-charged paper picks up the toner particles from the drum. After
D
picking up the toner, the paper is discharged to stop it clinging to the drum.

Complete the sequence by writing one of the letters A, B, C or D on the appropriate row.

1. A laser beam and a rotating mirror are used to draw an image of the page on the
photosensitive drum.

2. .........................

3. Electrostatic charge attracts toner.

4. The charged paper is rolled against the drum.

5. .........................

6. .........................

7. ......................... [3]

(ii) A computer user has a laser printer to print letters and documents. The user also prints
digital photographs taken using a digital camera.

State the most suitable type of printer for printing the photographs.

.......................................................................................................................................[1]

(b) The user is considering the purchase of a new laptop computer. She has read many product
reviews and knows that there are different types of internal secondary storage available.

List two options for internal secondary storage.

Option 1 ....................................................................................................................................

Option 2 ....................................................................................................................................

Describe one advantage of one of the options.

Advantage of choosing option 1 / 2 (circle)


...................................................................................................................................................

...............................................................................................................................................[3]
© UCLES 2017 9608/11/M/J/17
5

Question 3 begins on page 6.

© UCLES 2017 9608/11/M/J/17 [Turn over


6

3 (a) A computer has a microphone and captures a voice recording using sound recording software.

Before making a recording, the user can select the sampling rate.

Define the term sampling rate. Explain how the sampling rate will influence the accuracy of
the digitised sound.

Sampling rate ...........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Explanation ...............................................................................................................................

...................................................................................................................................................
[2]

(b) The computer also has bitmap software.

(i) Define the terms pixel and screen resolution.

Pixel ...................................................................................................................................

...........................................................................................................................................

Screen resolution ..............................................................................................................

...........................................................................................................................................
[2]

(ii) A picture has been drawn and is saved as a monochrome bitmap image.

State how many pixels are stored in one byte.

.......................................................................................................................................[1]

(iii) A second picture has width 2048 pixels and height 512 pixels. It is saved as a 256-colour
image.

Calculate the file size in kilobytes.

Show your working.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

© UCLES 2017 9608/11/M/J/17


7

(iv) The actual bitmap file size will be larger than your calculated value.

State another data item that the bitmap file stores in addition to the pixel data.

...........................................................................................................................................

.......................................................................................................................................[1]

© UCLES 2017 9608/11/M/J/17 [Turn over


8

4 The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC) and an Index Register (IX).

Instruction
Op code Op code Explanation
Operand
(mnemonic) (binary)
Immediate addressing. Load the denary number n to
LDM #n 0000 0001
ACC.
Direct addressing. Load the contents of the location
LDD <address> 0000 0010
at the given address to ACC.
Indirect addressing. At the given address is the
LDI <address> 0000 0101 address to be used. Load the contents of this second
address to ACC.
Indexed addressing. Form the address from
<address> + the contents of the Index Register
LDX <address> 0000 0110
(IX). Copy the contents of this calculated address to
ACC.
LDR #n 0000 0111 Immediate addressing. Load number n to IX.
STO <address> 0000 1111 Store the contents of ACC at the given address.

The following diagram shows the contents of a section of main memory and the Index Register (IX).

(a) Show the contents of the Accumulator (ACC) after each instruction is executed.

IX 0 0 0 0 0 0 1 1

Main
(i) LDM #500
Memory
Address contents
ACC ................................................................[1]
495 13
(ii) LDD 500
496 86
ACC ................................................................[1] 497 92

(iii) LDX 500 498 486


499 489
ACC ................................................................[1]
500 496
(iv) LDI 500 501 497
ACC ................................................................[1] 502 499
503 502

© UCLES 2017 9608/11/M/J/17


9

(b) Each machine code instruction is encoded as 16-bits (8-bit op code followed by an 8-bit
operand).

Write the machine code for the following instructions:

LDM #17

LDX #97

[3]

(c) Using an 8-bit operand, state the maximum number of memory locations, in denary, that can
be directly addressed.

...............................................................................................................................................[1]

(d) Computer scientists often write binary representations in hexadecimal.

(i) Write the hexadecimal representation for this instruction:

0 0 0 0 0 1 1 1 1 1 0 0 0 0 1 0

.......................................................................................................................................[2]

(ii) A second instruction has been written in hexadecimal as:

05 3F

Write the equivalent assembly language instruction, with the operand in denary.

.......................................................................................................................................[2]

© UCLES 2017 9608/11/M/J/17 [Turn over


10

5 A computer receives data from a remote data logger. Each data block is a group of 8 bytes.
A block is made up of seven data bytes and a parity byte.

Each data byte has a parity bit using odd parity. The parity byte also uses odd parity.

The following table shows a data block before transmission. Bit position 0 is the parity bit.

Bit position
7 6 5 4 3 2 1 0
1 1 0 0 1 1 0 1
0 0 1 0 0 0 0 0
1 0 0 1 1 1 0 A
1 1 0 0 0 0 1 0 Data bytes
1 1 0 0 0 0 1 0
1 1 0 0 0 1 1 B
0 0 0 0 0 0 0 0

0 1 1 0 1 1 0 0 Parity byte

(a) (i) Describe how the data logger calculates the parity bit for each of the bytes in the data
block.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) State the two missing parity bits labelled A and B.

A = ..............................

B = .............................. [1]

(iii) Describe how the computer uses the parity byte to perform a further check on the
received data bytes.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2017 9608/11/M/J/17


11

(b) (i) A second data block is received as shown in the following table. There are errors in this
data block.

Identify and then circle two bits in the table which must be changed to remove the errors.

Bit position
7 6 5 4 3 2 1 0
1 0 0 0 1 1 0 0
0 0 1 0 0 0 0 0
0 0 1 1 0 1 0 1
1 1 1 1 0 0 0 1
1 1 0 0 0 0 1 0
0 0 1 0 0 1 0 0
0 0 0 0 0 0 0 1

0 1 0 1 1 0 0 0
[2]

(ii) Explain how you arrived at your answers for part (b)(i).

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

© UCLES 2017 9608/11/M/J/17 [Turn over


12

6 (a) The operating system (OS) contains code for performing various management tasks.

The appropriate code is run when the user performs various actions.

Draw a line to link each OS management task to the appropriate user action.

OS management task Action

Main memory The user moves the mouse on


management the desktop

Input/Output The user closes the


management spreadsheet program

The user selects the Save


Secondary storage
command to save their
management
spreadsheet file

Human computer The user selects the Print


interface command to output their
management spreadsheet document
[3]

(b) A user has the following issues with the use of his PC.

State the utility software which should provide a solution.

(i) The hard disk stores a large number of video files. The computer frequently runs out of
storage space.

Utility software solution .................................................................................................[1]

(ii) The user is unable to find an important document. He thinks it was deleted in error some
weeks ago. This must not happen again.

Utility software solution .................................................................................................[1]

(iii) The operating system reports ‘Bad sector’ errors.

Utility software solution .................................................................................................[1]

(iv) There have been some unexplained images and advertisements appearing on the
screen. The user suspects it is malware.

Utility software solution .................................................................................................[1]

© UCLES 2017 9608/11/M/J/17


13

7 The design of a web-based application can require the use of client-side scripting.

(a) Describe what is meant by client-side scripting.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) A user requests a web page by keying the Uniform Resource Locator (URL) into the address
bar of their web browser.

The requested page contains a client-side script.

Describe the sequence of steps leading to the display of the web page on the computer
screen.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2017 9608/11/M/J/17 [Turn over


14

(c) A web page used for data capture consists of:

• two text boxes for the entry of:


• a product code
• the number of items to be purchased.
• a button which is clicked when the user wants to submit this order.

Study the following web page.

1 <html>
2 <head>
3 <title>Untitled Document</title>
4 <script language="JavaScript">
5
6 function myButton_onmousedown()
7 {
8 var Message1 = "ERROR – Order refused";
9 var Message2 = "Product code OK";
10 var x = document.forms["form1"]["txtProductCode"].value;
11 if (x == "")
12 {
13 alert(Message1)
14 }
15 else
16 {
17 alert(Message2)
18 }
19 }
20 </script>
21
22 </head>
23 <body>
24 <form name = form1>
25 <label>Product code: </label>
26 <input type="text" name="txtProductCode" >
27 <label>Number: </label>
28 <input type="text" name="txtNumber" size = "5" >
29 <p>
30 <label>Submit order: </label>
31 <input type="button" name="btnSubmit" Value = "Submit"
32
33 onMouseDown = "myButton_onmousedown()" >
34 </p>
35 </form>
36
37 </body>
38 </html>

© UCLES 2017 9608/11/M/J/17


15

(i) The developer has used three variables in the JavaScript code. State the identifiers used.

1 ..................................................................

2 ..................................................................

3 .................................................................. [2]

(ii) The button has an event whose identifier is onMouseDown. When the submit button is
clicked, some code is executed.

State the line numbers that contain this code.

From line .............................. to line .............................. [1]

(iii) The JavaScript code uses a selection statement.

State the line number that contains the condition.

Line number: ................................................................. [1]

(iv) Describe the purpose of the validation check that the code performs.

...........................................................................................................................................

.......................................................................................................................................[1]

(v) Name and describe two other types of validation check that could be appropriate for this
data capture form.

Validation check: ...............................................................................................................

Description ........................................................................................................................

...........................................................................................................................................

Validation check: ...............................................................................................................

Description ........................................................................................................................

...........................................................................................................................................
[4]

© UCLES 2017 9608/11/M/J/17


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 9608/11/M/J/17


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 4 2 4 3 5 2 8 4 6 3 *

COMPUTER SCIENCE 9608/13


Paper 1 Theory Fundamentals October/November 2016
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 13 printed pages and 3 blank pages.

DC (KN/SG) 128900
© UCLES 2016 [Turn over
2

1 (a) Five descriptions and seven relational database terms are shown below.

Draw a line to link each description to its correct database term.

Description Database term

Any object, person or thing about which


it is possible to store data
Secondary key

Candidate key
Dataset organised in rows and columns;
the columns form the structure and the
rows form the content
Entity

Any attribute or combination of attributes Foreign key


that can act as a unique key

Primary key
Attribute(s) in a table that link to the
primary key in another table to form a
relationship Table

Tuple
Attribute or combination of attributes that
is used to uniquely identify a record

[5]

(b) Explain what is meant by referential integrity.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2016 9608/13/O/N/16


3

2 (a) State two differences between Static RAM (SRAM) and Dynamic RAM (DRAM).

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...............................................................................................................................................[2]

(b) (i) Explain why a computer needs an operating system.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Give two key management tasks carried out by an operating system.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

.......................................................................................................................................[2]

(c) New program code is to be written in a high-level language. The use of Dynamic Link Library
(DLL) files is considered in the design.

Describe what is meant by a DLL file.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2016 9608/13/O/N/16 [Turn over


4

3 (a) (i) Convert the denary number 46 to an 8-bit binary integer.

...........................................................................................................................................

.......................................................................................................................................[1]

(ii) Convert the denary integer – 46 to an 8-bit two’s complement form.

...........................................................................................................................................

.......................................................................................................................................[1]

(iii) Convert the denary number 46 into hexadecimal.

...........................................................................................................................................

.......................................................................................................................................[1]

(b) Binary Coded Decimal (BCD) is another way of representing numbers.

(i) Describe how denary integers larger than 9 can be converted into BCD.
Give an example in your answer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Describe how an 8-bit BCD representation can be converted into a denary integer.
Give an example in your answer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2016 9608/13/O/N/16


5

4 Describe the basic internal operation of the following devices:

(i) Keyboard

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(ii) Optical disc

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(iii) Optical mouse

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(iv) Scanner

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2016 9608/13/O/N/16 [Turn over


6

5 A motor is controlled by a logic circuit. The circuit has inputs (0 or 1) from three sensors
R, T and W. The motor is switched off when the output from the logic circuit is 1.

The following table shows the three sensors and the conditions being monitored.

Sensor Description Binary value Condition

0 rotation < 4000 rpm


R rotation
1 rotation >= 4000 rpm

0 temperature >= 90 °C
T temperature
1 temperature < 90 °C

0 water flow rate >= 50 litre/min


W water flow rate
1 water flow rate < 50 litre/min

The output, X, is 1 if:

temperature >= 90 °C and rotation >= 4000 rpm

or

temperature < 90 °C and water flow rate >= 50 litre/min

(i) Draw a corresponding logic circuit.

T X

[5]

© UCLES 2016 9608/13/O/N/16


7

(ii) Give a logic statement corresponding to the logic circuit in part (i).

...........................................................................................................................................

.......................................................................................................................................[2]

(iii) Complete the truth table for this system.

INPUT Workspace OUTPUT

R T W X

0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]

6 A user watches a video available on a website. The website uses on-demand bit streaming.

Describe how it is possible to watch the video without it continually pausing.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2016 9608/13/O/N/16 [Turn over


8

7 A small company produces scientific magazines. The owner buys some new desktop computers.
The computers are used to store thousands of colour images (diagrams and photographs). All the
computers have Internet access.

(a) Name three utility programs the company would use on all their computers. Describe what
each program does.

1 ................................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

Description ................................................................................................................................

...............................................................................................................................................[6]

(b) The images contained in the magazines are produced using either bitmap or vector graphics
software.

Give four differences between bitmap and vector graphics.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9608/13/O/N/16


9

(c) Employees using the new computers receive training. At the end of the training, each
employee completes a series of questions.

Three answers given by an employee are shown below.

Explain why each answer is incorrect.

(i) “Encryption prevents hackers breaking into the company’s computers.”

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) “Data validation is used to make sure that data keyed in are the same as the original data
supplied.”

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(iii) “The use of passwords will always prevent unauthorised access to the data stored on the
computers.”

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2016 9608/13/O/N/16 [Turn over


10

8 The table shows assembly language instructions for a processor which has one general purpose
register, the Accumulator (ACC) and an Index Register (IX).

Instruction
Explanation
Op code Operand
LDD <address> Direct addressing. Load the contents of the given address to ACC.
Indexed addressing. Form the address from <address> + the
LDX <address> contents of the index register. Copy the contents of this calculated
address to ACC.
STO <address> Store contents of ACC at the given address.
ADD <address> Add the contents of the given address to ACC.
CMP <address> Compare contents of ACC with contents of <address>
Following a compare instruction, jump to <address> if the compare
JPE <address>
was True.
Following a compare instruction, jump to <address> if the compare
JPN <address>
was False.
JMP <address> Jump to the given address.
Output to the screen the character whose ASCII value is stored in
OUT
ACC.
END Return control to the operating system.

The diagram shows the contents of the main memory:

Main memory
800 0110 0100
801 0111 1100
802 1001 0111
803 0111 0011
804 1001 0000
805 0011 1111
806 0000 1110
807 1110 1000
808 1000 1110
809 1100 0010
:
:
2000 1011 0101

(a) (i) Show the contents of the Accumulator after execution of the instruction:

LDD 802

Accumulator:
[1]

© UCLES 2016 9608/13/O/N/16


11

(ii) Show the contents of the Accumulator after execution of the instruction:

LDX 800

Index Register: 0 0 0 0 1 0 0 1

Accumulator:

Explain how you arrived at your answer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

© UCLES 2016 9608/13/O/N/16 [Turn over


12

(b) (i) Complete the trace table below for the following assembly language program. This
program contains denary values.

100 LDD 800


101 ADD 801
102 STO 802
103 LDD 803
104 CMP 802
105 JPE 107
106 JPN 110
107 STO 802
108 OUT
109 JMP 112
110 LDD 801
111 OUT
112 END
:
:
800 40
801 50
802 0
803 90

Selected values from the ASCII character set:

ASCII code 40 50 80 90 100


Character ( 2 P Z d

Trace table:

Memory address
ACC OUTPUT
800 801 802 803

40 50 0 90

[4]

© UCLES 2016 9608/13/O/N/16


13

(ii) There is a redundant instruction in the code in part (b)(i).

State the address of this instruction.

.......................................................................................................................................[1]

(c) The program used the ASCII coding system for character codes. An alternative coding system
is Unicode.

(i) Give two disadvantages of using ASCII code.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

.......................................................................................................................................[2]

(ii) Describe how Unicode is designed to overcome the disadvantages of ASCII.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2016 9608/13/O/N/16


14

BLANK PAGE

© UCLES 2016 9608/13/O/N/16


15

BLANK PAGE

© UCLES 2016 9608/13/O/N/16


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 9608/13/O/N/16


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 4 2 0 4 5 4 4 6 8 6 *

COMPUTER SCIENCE 9608/12


Paper 1 Theory Fundamentals October/November 2016
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 12 printed pages.

DC (KN) 122134/3
© UCLES 2016 [Turn over
2

1 (a) A student writes the following logic expression:

X is 1 IF (B is NOT 1 AND S is NOT 1) OR (P is NOT 1 AND S is 1)

Draw a logic circuit to represent this logic expression.

Do not attempt to simplify the logic expression.

S X

[6]

(b) Complete the truth table for the logic expression given in part (a).

B S P Working space X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2016 9608/12/O/N/16


3

2 (a) When recording a video, state what is meant by frame rate.

...................................................................................................................................................

...............................................................................................................................................[1]

(b) Video streaming can use either interlaced encoding or progressive encoding.

Describe what is meant by the following terms.

Interlaced encoding

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Progressive encoding

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(c) (i) Name the video terms described below:

Description Term

Pixels in two video frames have the same value


in the same location. There is duplication of data
between frames. ................................................................

A sequence of pixels in a single video frame have


the same value.
................................................................

[2]

(ii) Give one file technique that could be applied when either of the two features, described
in part (c)(i), are present.

...........................................................................................................................................

.......................................................................................................................................[1]

© UCLES 2016 9608/12/O/N/16 [Turn over


4

3 When an application program requests a file stored on a hard disk, the computer system reads
the file. Use the statement labels A to H to complete the sequence of steps that describe how this
happens.

Label Statement

A When the hard disk drive has read the file, it generates an interrupt.

While the file continues, the head reads successive clusters of


B
sectors from the disk and writes data into the disk buffer.
The head reads the first cluster of sectors from disk and writes data
C
into the disk buffer.

D The head moves to the correct track.

The operating system transfers the contents of the disk buffer to the
E
application program’s data memory.
In the relevant directory file, the operating system looks up the track
F
and sector where the file begins.
Application program passes file read request to the operating
G
system.
The hard disk drive waits for the correct sector to arrive under the
H
head.

1. The application program executes a statement to read a file.

2. ............................

3. The operating system begins to spin the hard disk, if it is not currently spinning.

4. ............................

5. ............................

6. ............................

7. ............................

8. ............................

9. ............................

10. ............................
[8]

© UCLES 2016 9608/12/O/N/16


5

4 Hexadecimal, Binary Coded Decimal (BCD) and binary values are shown below.

Draw a line to link each value to its correct denary value.

Hexadecimal, BCD, binary Denary

93

Hexadecimal:

3A
–65

BCD representation: 58
0100 1001

–63

Binary integer:

01011101
73

Two’s complement
binary integer: 49

11000001

–93

[4]

© UCLES 2016 9608/12/O/N/16 [Turn over


6

5 The table shows assembly language instructions for a processor that has one general purpose
register, the Accumulator (ACC) and an index register (IX).

Instruction
Explanation
Op Code Operand
Direct addressing. Load the contents of the given address to
LDD <address>
ACC.
Index addressing. Form the address from <address> +
LDX <address> the contents of the index register. Copy the contents of this
calculated address to ACC.
Indirect addressing. The address to be used is at the given
LDI <address>
address. Load the contents of this second address to ACC.

STO <address> Store the contents of ACC at the given address.

INC <register> Add 1 to contents of the register (ACC or IX).

ADD <address> Add the contents of the given address to the ACC.

END Return control to the operating system.

The diagram shows the contents of a section of main memory:

Main memory

100 0000 0010


101 1001 0011
102 0111 0011
103 0110 1011
104 0111 1110
105 1011 0001
106 0110 1000
107 0100 1011

200 1001 1110

© UCLES 2016 9608/12/O/N/16


7

(a) (i) Show the contents of the Accumulator after the execution of the instruction:

LDD 102

ACC:
[1]

(ii) Show the contents of the Accumulator after the execution of the instruction:

LDX 101

IX: 0 0 0 0 0 1 0 0

ACC:

Explain how you arrived at your answer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(iii) Show the contents of the Accumulator after the execution of the instruction:

LDI 103

ACC:

Explain how you arrived at your answer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

© UCLES 2016 9608/12/O/N/16 [Turn over


8

(b) Complete the trace table below for the following assembly language program.

800 LDD 810

801 INC ACC

802 STO 812

803 LDD 811

804 ADD 812

805 STO 813

806 END

810 28
811 41
812 0
813 0

Trace table:

Memory address
ACC
810 811 812 813

28 41 0 0

[6]

© UCLES 2016 9608/12/O/N/16


9

6 (a) Describe two differences between RAM and ROM.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...............................................................................................................................................[2]

(b) State three differences between Dynamic RAM (DRAM) and Static RAM (SRAM).

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...............................................................................................................................................[3]

7 One management task carried out by an operating system is to provide a user interface.

Describe two more of these management tasks.

1 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2016 9608/12/O/N/16 [Turn over


10

8 A programmer is writing a program that includes code from a program library.

(a) Describe two benefits to the programmer of using one or more library routines.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) The programmer decides to use a Dynamic Link Library (DLL) file.

(i) Describe two benefits of using DLL files.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[4]

(ii) State one drawback of using DLL files.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2016 9608/12/O/N/16


11

9 A health club offers classes to its members. A member needs to book into each class in advance.

(a) The health club employs a programmer to update the class booking system. The programmer
has to decide how to store the records. The choice is between using a relational database or
a file-based approach.

Give three reasons why the programmer should use a relational database.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

(b) The programmer decides to use three tables: MEMBER, BOOKING and CLASS.

Complete the Entity-Relationship (E-R) diagram to show the relationships between these
tables.

MEMBER CLASS

BOOKING

[2]

© UCLES 2016 9608/12/O/N/16 [Turn over


12

(c) The CLASS table has primary key ClassID and stores the following data:

ClassID Description StartDate ClassTime NoOfSessions AdultsOnly

DAY01 Yoga beginners 12/01/2016 11:00 5 TRUE

EVE02 Yoga beginners 12/01/2016 19:00 5 FALSE

DAY16 Circuits 30/06/2016 10:30 4 FALSE

Write an SQL script to create the CLASS table.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 9608/12/O/N/16


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 1 6 7 0 4 5 4 7 5 0 *

COMPUTER SCIENCE 9608/11


Paper 1 Theory Fundamentals October/November 2016
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 13 printed pages and 3 blank pages.

DC (ST/SG) 115872/3
© UCLES 2016 [Turn over
2

1 (a) Five descriptions and seven relational database terms are shown below.

Draw a line to link each description to its correct database term.

Description Database term

Any object, person or thing about which


it is possible to store data
Secondary key

Candidate key
Dataset organised in rows and columns;
the columns form the structure and the
rows form the content
Entity

Any attribute or combination of attributes Foreign key


that can act as a unique key

Primary key
Attribute(s) in a table that link to the
primary key in another table to form a
relationship Table

Tuple
Attribute or combination of attributes that
is used to uniquely identify a record

[5]

(b) Explain what is meant by referential integrity.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2016 9608/11/O/N/16


3

2 (a) State two differences between Static RAM (SRAM) and Dynamic RAM (DRAM).

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...............................................................................................................................................[2]

(b) (i) Explain why a computer needs an operating system.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Give two key management tasks carried out by an operating system.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

.......................................................................................................................................[2]

(c) New program code is to be written in a high-level language. The use of Dynamic Link Library
(DLL) files is considered in the design.

Describe what is meant by a DLL file.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2016 9608/11/O/N/16 [Turn over


4

3 (a) (i) Convert the denary number 46 to an 8-bit binary integer.

...........................................................................................................................................

.......................................................................................................................................[1]

(ii) Convert the denary integer – 46 to an 8-bit two’s complement form.

...........................................................................................................................................

.......................................................................................................................................[1]

(iii) Convert the denary number 46 into hexadecimal.

...........................................................................................................................................

.......................................................................................................................................[1]

(b) Binary Coded Decimal (BCD) is another way of representing numbers.

(i) Describe how denary integers larger than 9 can be converted into BCD.
Give an example in your answer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Describe how an 8-bit BCD representation can be converted into a denary integer.
Give an example in your answer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2016 9608/11/O/N/16


5

4 Describe the basic internal operation of the following devices:

(i) Keyboard

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(ii) Optical disc

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(iii) Optical mouse

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(iv) Scanner

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2016 9608/11/O/N/16 [Turn over


6

5 A motor is controlled by a logic circuit. The circuit has inputs (0 or 1) from three sensors
R, T and W. The motor is switched off when the output from the logic circuit is 1.

The following table shows the three sensors and the conditions being monitored.

Sensor Description Binary value Condition

0 rotation < 4000 rpm


R rotation
1 rotation >= 4000 rpm

0 temperature >= 90 °C
T temperature
1 temperature < 90 °C

0 water flow rate >= 50 litre/min


W water flow rate
1 water flow rate < 50 litre/min

The output, X, is 1 if:

temperature >= 90 °C and rotation >= 4000 rpm

or

temperature < 90 °C and water flow rate >= 50 litre/min

(i) Draw a corresponding logic circuit.

T X

[5]

© UCLES 2016 9608/11/O/N/16


7

(ii) Give a logic statement corresponding to the logic circuit in part (i).

...........................................................................................................................................

.......................................................................................................................................[2]

(iii) Complete the truth table for this system.

INPUT Workspace OUTPUT

R T W X

0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]

6 A user watches a video available on a website. The website uses on-demand bit streaming.

Describe how it is possible to watch the video without it continually pausing.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2016 9608/11/O/N/16 [Turn over


8

7 A small company produces scientific magazines. The owner buys some new desktop computers.
The computers are used to store thousands of colour images (diagrams and photographs). All the
computers have Internet access.

(a) Name three utility programs the company would use on all their computers. Describe what
each program does.

1 ................................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

Description ................................................................................................................................

...............................................................................................................................................[6]

(b) The images contained in the magazines are produced using either bitmap or vector graphics
software.

Give four differences between bitmap and vector graphics.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9608/11/O/N/16


9

(c) Employees using the new computers receive training. At the end of the training, each
employee completes a series of questions.

Three answers given by an employee are shown below.

Explain why each answer is incorrect.

(i) “Encryption prevents hackers breaking into the company’s computers.”

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) “Data validation is used to make sure that data keyed in are the same as the original data
supplied.”

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(iii) “The use of passwords will always prevent unauthorised access to the data stored on the
computers.”

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2016 9608/11/O/N/16 [Turn over


10

8 The table shows assembly language instructions for a processor which has one general purpose
register, the Accumulator (ACC) and an Index Register (IX).

Instruction
Explanation
Op code Operand
LDD <address> Direct addressing. Load the contents of the given address to ACC.
Indexed addressing. Form the address from <address> + the
LDX <address> contents of the index register. Copy the contents of this calculated
address to ACC.
STO <address> Store contents of ACC at the given address.
ADD <address> Add the contents of the given address to ACC.
CMP <address> Compare contents of ACC with contents of <address>
Following a compare instruction, jump to <address> if the compare
JPE <address>
was True.
Following a compare instruction, jump to <address> if the compare
JPN <address>
was False.
JMP <address> Jump to the given address.
Output to the screen the character whose ASCII value is stored in
OUT
ACC.
END Return control to the operating system.

The diagram shows the contents of the main memory:

Main memory
800 0110 0100
801 0111 1100
802 1001 0111
803 0111 0011
804 1001 0000
805 0011 1111
806 0000 1110
807 1110 1000
808 1000 1110
809 1100 0010
:
:
2000 1011 0101

(a) (i) Show the contents of the Accumulator after execution of the instruction:

LDD 802

Accumulator:
[1]

© UCLES 2016 9608/11/O/N/16


11

(ii) Show the contents of the Accumulator after execution of the instruction:

LDX 800

Index Register: 0 0 0 0 1 0 0 1

Accumulator:

Explain how you arrived at your answer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

© UCLES 2016 9608/11/O/N/16 [Turn over


12

(b) (i) Complete the trace table below for the following assembly language program. This
program contains denary values.

100 LDD 800


101 ADD 801
102 STO 802
103 LDD 803
104 CMP 802
105 JPE 107
106 JPN 110
107 STO 802
108 OUT
109 JMP 112
110 LDD 801
111 OUT
112 END
:
:
800 40
801 50
802 0
803 90

Selected values from the ASCII character set:

ASCII code 40 50 80 90 100


Character ( 2 P Z d

Trace table:

Memory address
ACC OUTPUT
800 801 802 803

40 50 0 90

[4]

© UCLES 2016 9608/11/O/N/16


13

(ii) There is a redundant instruction in the code in part (b)(i).

State the address of this instruction.

.......................................................................................................................................[1]

(c) The program used the ASCII coding system for character codes. An alternative coding system
is Unicode.

(i) Give two disadvantages of using ASCII code.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

.......................................................................................................................................[2]

(ii) Describe how Unicode is designed to overcome the disadvantages of ASCII.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2016 9608/11/O/N/16


14

BLANK PAGE

© UCLES 2016 9608/11/O/N/16


15

BLANK PAGE

© UCLES 2016 9608/11/O/N/16


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 9608/11/O/N/16


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 0 2 7 6 2 3 0 7 1 4 *

COMPUTER SCIENCE 9608/13


Paper 1 Theory Fundamentals May/June 2016
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 13 printed pages and 3 blank pages.

DC (ST) 122368/2
© UCLES 2016 [Turn over
2

1 Describe two differences between a compiler and interpreter.

1 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

2 (a) Convert the following 8-bit binary integer into denary.

01001101

...............................................................................................................................................[1]

(b) Convert the following denary number into Binary Coded Decimal (BCD).

82
...............................................................................................................................................[1]

(c) Convert the following two’s complement integer number into denary.

11001011
...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(d) Convert the following denary number into hexadecimal. Show your working.

198

...............................................................................................................................................[2]

© UCLES 2016 9608/13/M/J/16


3

3 A company needs new software to manage its accounts. It is evaluating two different options. One
option is open source software and the other is commercial software.

(a) Explain what is meant by open source software.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Explain what is meant by commercial software.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) The company has decided to purchase commercial software.

Identify four benefits to the company in choosing the commercial software option.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9608/13/M/J/16 [Turn over


4

Question 4 begins on page 5.

© UCLES 2016 9608/13/M/J/16


5

4 The table shows assembly language instructions for a processor which has one general purpose
register, the Accumulator (ACC) and an index register (IX).

Instruction Explanation

Op code Operand

LDD <address> Direct addressing. Load the contents of the given address to ACC.
Indexed addressing. Form the address from <address> + the contents of the
LDX <address>
index register. Copy the contents of this calculated address to ACC.
STO <address> Store contents of ACC at the given address.

ADD <address> Add the contents of the given address to ACC.

INC <register> Add 1 to the contents of the register (ACC or IX).

DEC <register> Subtract 1 from the contents of the register (ACC or IX).

CMP <address> Compare contents of ACC with contents of <address>.

JPE <address> Following a compare instruction, jump to <address> if the compare was True.

JPN <address> Following a compare instruction, jump to <address> if the compare was False.

JMP <address> Jump to the given address.

OUT Output to screen the character whose ASCII value is stored in ACC.

END Return control to the operating system.

The diagram shows the contents of the index register:

Index register: 1 1 0 0 1 1 0 1

(a) Show the contents of the index register after the execution of the instruction:

INC IX

Index register:
[1]

© UCLES 2016 9608/13/M/J/16 [Turn over


6

(b) Complete the trace table on the opposite page for the following assembly language program.

20 LDX 90

21 DEC ACC

22 STO 90

23 INC IX

24 LDX 90

25 DEC ACC

26 CMP 90

27 JPE 29

28 JPN 31

29 ADD 90

30 OUT

31 ADD 93

32 STO 93

33 OUT

34 END
:
:

90 2

91 90

92 55

93 34

IX 2

Selected values from the ASCII character set:

ASCII Code 65 66 67 68 69 70 71 72
Character A B C D E F G H

© UCLES 2016 9608/13/M/J/16


7

Trace table:

Memory address
Working ACC IX OUTPUT
Instruction
space 90 91 92 93

2 90 55 34 2

20

21

22

23

24

25

26

[7]

© UCLES 2016 9608/13/M/J/16 [Turn over


8

5 (a) A Database Management System (DBMS) provides the following features.

Draw a line to match each feature with its description.

Feature Description

A file or table containing all the details of the


database design
Data dictionary

Data design features to ensure the validity


of data in the database

Data security

A model of what the database will look like,


although it may not be stored in this way

Data integrity Methods of protecting the data including


the uses of passwords and different access
rights for different users of the database

[3]

A school stores a large amount of data that includes student attendance, qualification and contact
details. The school is setting up a relational database to store these data.

(b) The school needs to safeguard against any data loss.

Describe three factors to consider when planning a backup procedure for the data.

Justify your decisions.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]
© UCLES 2016 9608/13/M/J/16
9

(c) The database design has three tables to store the qualifications and grades each student has
attained. The following is a sample of the data from each table.

STUDENT

StudentID FirstName LastName Tutor

001AT Ahmad Tan 11A

003JL Jane Li 11B

011HJ Heather Jones 10A

QUALIFICATION

QualCode Level Subject

CS1 IGCSE Computer Science

MT9 IGCSE Maths

SC12 IGCSE Science

STUDENT-QUALIFICATION

QualCode StudentID Grade DateOfAward

SC12 011HJ A 31/8/2014

SC12 003JL C 31/8/2014

CS1 003JL B 31/8/2014

(i) Draw an Entity-Relationship (E-R) diagram to show the relationships between these
three tables.

[2]

(ii) State the type of relationship that exists between STUDENT and
STUDENT-QUALIFICATION.

.......................................................................................................................................[1]

© UCLES 2016 9608/13/M/J/16 [Turn over


10

(iii) Describe how the relationship between QUALIFICATION and


STUDENT-QUALIFICATION is implemented.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(d) (i) The database will store each student’s date of birth.

Write an SQL script to add a date of birth attribute to the appropriate table.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Write an SQL script to display the StudentID, Grade and DateOfAward for the
QualCode value of SC12.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

(iii) Write an SQL script to display the FirstName and LastName and QualCode for all
STUDENT-QUALIFICATIONs for which the Grade value is A.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[4]
© UCLES 2016 9608/13/M/J/16
11

6 (a) Explain the difference between the World Wide Web (WWW) and the Internet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Three methods of connecting devices include fibre-optic cables, copper cables and radio
waves. The table below gives descriptions relating to these connection methods.

Tick (✓) one box on each row to show the method that best fits each description.

Description Fibre-optic cable Copper cable Radio waves


Wireless medium
Twisted-pair is an
example
Uses light waves
WiFi
Fastest transmission
medium
[5]

(c) Bit streaming is used for both real-time and on-demand services.

Describe one difference between real-time and on-demand bit streaming.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(d) A device needs an IP address to connect to the Internet. IPv4 is the more common type of
IP address.

Describe, using an example, the format of an IPv4 address.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]
© UCLES 2016 9608/13/M/J/16 [Turn over
12

(e) A computer user keys in the Uniform Resource Locator (URL) of a web page into a web
browser.

Describe how the browser uses the Domain Name Service (DNS) to display the web page.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9608/13/M/J/16


13

7 A bank holds personal data about its customers and their financial data.

(a) Describe the difference between security and integrity of data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Describe three security measures that the bank could implement to protect its electronic
data.

Security measure 1 ...................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Security measure 2 ...................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Security measure 3 ...................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9608/13/M/J/16


14

BLANK PAGE

© UCLES 2016 9608/13/M/J/16


15

BLANK PAGE

© UCLES 2016 9608/13/M/J/16


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 9608/13/M/J/16


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 5 1 6 8 8 9 9 5 3 4 *

COMPUTER SCIENCE 9608/12


Paper 1 Theory Fundamentals May/June 2016
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 15 printed pages and 1 blank page.

DC (ST) 126463
© UCLES 2016 [Turn over
2

1 Three examples of language translators and four definitions are shown below.

Draw lines to link each language translator to the correct one or more definitions.

Language translator Definition

The software reads the source code


and reports all errors. The software
produces an executable file.

Compiler

The software reads each statement


and checks it before running it. The
software halts when it encounters a
syntax error.

Assembler

The software translates a high-level


language program into machine code
for the processor to execute.

Interpreter

The software translates low-level


statements into machine code for the
processor to execute.

[3]

© UCLES 2016 9608/12/M/J/16


3

2 (a) Convert the following denary integer into 8-bit binary.

55

[1]

(b) Convert the following Binary Coded Decimal (BCD) number into denary.

10000011

...............................................................................................................................................[1]

(c) Convert the following denary integer into 8-bit two’s complement.

-102

[2]

(d) Convert the following hexadecimal number into denary.

4E

...............................................................................................................................................[1]

© UCLES 2016 9608/12/M/J/16 [Turn over


4

3 (a) Describe how special purpose registers are used in the fetch stage of the fetch-execute cycle.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Use the statements A, B, C and D to complete the description of how the fetch-execute cycle
handles an interrupt.

the address of the Interrupt Service Routine (ISR) is loaded to the Program
A
Counter (PC).
B the processor checks if there is an interrupt.
C when the ISR completes, the processor restores the register contents.
D the register contents are saved.

At the end of the cycle for the current instruction ............................ .

If the interrupt flag is set, ............................ , ............................ and ............................ .

The interrupted program continues its execution.


[4]

© UCLES 2016 9608/12/M/J/16


5

4 A group of students broadcast a school radio station on a website. They record their sound clips
(programmes) in advance and email them to the producer.

(a) Describe how sampling is used to record the sound clips.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) The students use software to compress the sound clips before emailing them.

(i) Circle your chosen method of compression and justify your choice.

Lossy / Lossless

Justification: .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

Students also email images to the radio station for use on its website.

These are compressed before sending using run-length encoding (RLE).

(ii) Explain what is meant by run-length encoding.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

© UCLES 2016 9608/12/M/J/16 [Turn over


6

(iii) The following diagrams show:

• the denary colour code that represents each colour


• the first three rows of a bitmap image

Colour symbol Colour code


(denary)

B 153

W 255

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 B B B B B B B B B B W W W B B B

1 B B B B B B B B B W W W W W W B

2 B B B B B B B W W W W W W W W W

95

Show how RLE will compress the first three rows of this image.

Row 1: ...............................................................................................................................

Row 2: ...............................................................................................................................

Row 3: ...........................................................................................................................[2]

© UCLES 2016 9608/12/M/J/16


7

5 Three types of software licensing and four descriptions are shown in the table below.

Put a tick (✓) in each row to match each description to the appropriate type of software licensing.

Type of software

Description Open source Shareware Commercial

Software is purchased
before it can be used
Source code comes with
the software
Software is provided free
on a trial basis

The software can be


modified by the user

[4]

6 A team of software engineers is developing a new e-commerce program for a client.

State three of the principles of the ACM/IEEE Software Engineering Code of Ethics. Illustrate
each one, with an example, describing how it will influence their working practices.

1 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2016 9608/12/M/J/16 [Turn over


8

7 Access to World Wide Web content uses IP addressing.

(a) State what IP stands for.

...............................................................................................................................................[1]

(b) The following table shows four possible IP addresses.

Indicate for each IP address whether it is valid or invalid and give a reason.

Denary / Valid or
Address Reason
Hexadecimal Invalid

3.2A.6AA.BBBB Hexadecimal

2.0.255.1 Denary

6.0.257.6 Denary

A.78.F4.J8 Hexadecimal

[4]

(c) Describe two differences between public and private IP addresses.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2016 9608/12/M/J/16


9

8 A school stores a large amount of data. This includes student attendance, qualification, and
contact details. The school’s software uses a file-based approach to store this data.

(a) The school is considering changing to a DBMS.

(i) State what DBMS stands for.

.......................................................................................................................................[1]

(ii) Describe two ways in which the Database Administrator (DBA) could use the DBMS
software to ensure the security of the student data.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[4]

(iii) A feature of the DBMS software is a query processor.

Describe how the school secretary could use this software.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(iv) The DBMS has replaced software that used a file-based approach with a relational
database.

Describe how using a relational database has overcome the previous problems
associated with a file-based approach.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

© UCLES 2016 9608/12/M/J/16 [Turn over


10

(b) The database design has three tables to store the classes that students attend.

STUDENT(StudentID, FirstName, LastName, Year, TutorGroup)

CLASS(ClassID, Subject)

CLASS-GROUP(StudentID, ClassID)

Primary keys are not shown.

There is a one-to-many relationship between CLASS and CLASS–GROUP.

(i) Describe how this relationship is implemented.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Describe the relationship between CLASS-GROUP and STUDENT.

.......................................................................................................................................[1]

(iii) Write an SQL script to display the StudentID and FirstName of all students who are
in the tutor group 10B. Display the list in alphabetical order of LastName.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[4]

(iv) Write an SQL script to display the LastName of all students who attend the class whose
ClassID is CS1.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[4]

© UCLES 2016 9608/12/M/J/16


11

Question 9 begins on page 12.

© UCLES 2016 9608/12/M/J/16 [Turn over


12

9 The table shows assembly language instructions for a processor which has one general purpose
register, the Accumulator (ACC) and an index register (IX).

Instruction
Explanation

Op code Operand

LDD <address> Direct addressing. Load the contents of the given address to ACC.

LDX <address> Indexed addressing. Form the address from <address> + the contents of the
index register. Copy the contents of this calculated address to ACC.
STO <address> Store contents of ACC at the given address.

ADD <address> Add the contents of the given address to ACC.

INC <register> Add 1 to the contents of the register (ACC or IX).

DEC <register> Subtract 1 from the contents of the register (ACC or IX).

CMP <address> Compare contents of ACC with contents of <address>.

JPE <address> Following a compare instruction, jump to <address> if the compare was True.

JPN <address> Following a compare instruction, jump to <address> if the compare was
False.
JMP <address> Jump to the given address.

OUT Output to screen the character whose ASCII value is stored in ACC.

END Return control to the operating system.

(a) The diagram shows the current contents of a section of main memory and the index register:

60 0011 0010
61 0101 1101
62 0000 0100
63 1111 1001
64 0101 0101
65 1101 1111
66 0000 1101
67 0100 1101
68 0100 0101
69 0100 0011
...
1000 0110 1001

Index register: 0 0 0 0 1 0 0 0

© UCLES 2016 9608/12/M/J/16


13

(i) Show the contents of the Accumulator after the execution of the instruction:

LDX 60

Accumulator:

Show how you obtained your answer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Show the contents of the index register after the execution of the instruction:

DEC IX

Index register:
[1]

© UCLES 2016 9608/12/M/J/16 [Turn over


14

(b) Complete the trace table on the opposite page for the following assembly language program.

50 LDD 100

51 ADD 102

52 STO 103

53 LDX 100

54 ADD 100

55 CMP 101

56 JPE 58

57 JPN 59

58 OUT

59 INC IX

60 LDX 98

61 ADD 101

62 OUT

63 END

...

100 20

101 100

102 1

103 0

IX (Index Register) 1

Selected values from the ASCII character set:

ASCII Code 118 119 120 121 122 123 124 125
Character v w x y z { | }

© UCLES 2016 9608/12/M/J/16


15

Trace table:

Memory address
Instruction Working ACC IX OUTPUT
address space 100 101 102 103

20 100 1 0 1

50

51

52

53

54

55

[7]

© UCLES 2016 9608/12/M/J/16


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 9608/12/M/J/16


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 0 9 9 1 9 8 6 0 2 1 *

COMPUTER SCIENCE 9608/11


Paper 1 Theory Fundamentals May/June 2016
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 15 printed pages and 1 blank page.

DC (ST) 122367/2
© UCLES 2016 [Turn over
2

1 Three examples of language translators and four definitions are shown below.

Draw lines to link each language translator to the correct one or more definitions.

Language translator Definition

The software reads the source code


and reports all errors. The software
produces an executable file.

Compiler

The software reads each statement


and checks it before running it. The
software halts when it encounters a
syntax error.

Assembler

The software translates a high-level


language program into machine code
for the processor to execute.

Interpreter

The software translates low-level


statements into machine code for the
processor to execute.

[3]

© UCLES 2016 9608/11/M/J/16


3

2 (a) Convert the following denary integer into 8-bit binary.

55

[1]

(b) Convert the following Binary Coded Decimal (BCD) number into denary.

10000011

...............................................................................................................................................[1]

(c) Convert the following denary integer into 8-bit two’s complement.

-102

[2]

(d) Convert the following hexadecimal number into denary.

4E

...............................................................................................................................................[1]

© UCLES 2016 9608/11/M/J/16 [Turn over


4

3 (a) Describe how special purpose registers are used in the fetch stage of the fetch-execute cycle.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Use the statements A, B, C and D to complete the description of how the fetch-execute cycle
handles an interrupt.

the address of the Interrupt Service Routine (ISR) is loaded to the Program
A
Counter (PC).
B the processor checks if there is an interrupt.
C when the ISR completes, the processor restores the register contents.
D the register contents are saved.

At the end of the cycle for the current instruction ............................ .

If the interrupt flag is set, ............................ , ............................ and ............................ .

The interrupted program continues its execution.


[4]

© UCLES 2016 9608/11/M/J/16


5

4 A group of students broadcast a school radio station on a website. They record their sound clips
(programmes) in advance and email them to the producer.

(a) Describe how sampling is used to record the sound clips.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) The students use software to compress the sound clips before emailing them.

(i) Circle your chosen method of compression and justify your choice.

Lossy / Lossless

Justification: .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

Students also email images to the radio station for use on its website.

These are compressed before sending using run-length encoding (RLE).

(ii) Explain what is meant by run-length encoding.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

© UCLES 2016 9608/11/M/J/16 [Turn over


6

(iii) The following diagrams show:

• the denary colour code that represents each colour


• the first three rows of a bitmap image

Colour symbol Colour code


(denary)

B 153

W 255

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

0 B B B B B B B B B B W W W B B B

1 B B B B B B B B B W W W W W W B

2 B B B B B B B W W W W W W W W W

95

Show how RLE will compress the first three rows of this image.

Row 1: ...............................................................................................................................

Row 2: ...............................................................................................................................

Row 3: ...........................................................................................................................[2]

© UCLES 2016 9608/11/M/J/16


7

5 Three types of software licensing and four descriptions are shown in the table below.

Put a tick (✓) in each row to match each description to the appropriate type of software licensing.

Type of software

Description Open source Shareware Commercial

Software is purchased
before it can be used
Source code comes with
the software
Software is provided free
on a trial basis

The software can be


modified by the user

[4]

6 A team of software engineers is developing a new e-commerce program for a client.

State three of the principles of the ACM/IEEE Software Engineering Code of Ethics. Illustrate
each one, with an example, describing how it will influence their working practices.

1 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2016 9608/11/M/J/16 [Turn over


8

7 Access to World Wide Web content uses IP addressing.

(a) State what IP stands for.

...............................................................................................................................................[1]

(b) The following table shows four possible IP addresses.

Indicate for each IP address whether it is valid or invalid and give a reason.

Denary / Valid or
Address Reason
Hexadecimal Invalid

3.2A.6AA.BBBB Hexadecimal

2.0.255.1 Denary

6.0.257.6 Denary

A.78.F4.J8 Hexadecimal

[4]

(c) Describe two differences between public and private IP addresses.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2016 9608/11/M/J/16


9

8 A school stores a large amount of data. This includes student attendance, qualification, and
contact details. The school’s software uses a file-based approach to store this data.

(a) The school is considering changing to a DBMS.

(i) State what DBMS stands for.

.......................................................................................................................................[1]

(ii) Describe two ways in which the Database Administrator (DBA) could use the DBMS
software to ensure the security of the student data.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[4]

(iii) A feature of the DBMS software is a query processor.

Describe how the school secretary could use this software.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(iv) The DBMS has replaced software that used a file-based approach with a relational
database.

Describe how using a relational database has overcome the previous problems
associated with a file-based approach.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

© UCLES 2016 9608/11/M/J/16 [Turn over


10

(b) The database design has three tables to store the classes that students attend.

STUDENT(StudentID, FirstName, LastName, Year, TutorGroup)

CLASS(ClassID, Subject)

CLASS-GROUP(StudentID, ClassID)

Primary keys are not shown.

There is a one-to-many relationship between CLASS and CLASS–GROUP.

(i) Describe how this relationship is implemented.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Describe the relationship between CLASS-GROUP and STUDENT.

.......................................................................................................................................[1]

(iii) Write an SQL script to display the StudentID and FirstName of all students who are
in the tutor group 10B. Display the list in alphabetical order of LastName.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[4]

(iv) Write an SQL script to display the LastName of all students who attend the class whose
ClassID is CS1.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[4]

© UCLES 2016 9608/11/M/J/16


11

Question 9 begins on page 12.

© UCLES 2016 9608/11/M/J/16 [Turn over


12

9 The table shows assembly language instructions for a processor which has one general purpose
register, the Accumulator (ACC) and an index register (IX).

Instruction
Explanation

Op code Operand

LDD <address> Direct addressing. Load the contents of the given address to ACC.

LDX <address> Indexed addressing. Form the address from <address> + the contents of the
index register. Copy the contents of this calculated address to ACC.
STO <address> Store contents of ACC at the given address.

ADD <address> Add the contents of the given address to ACC.

INC <register> Add 1 to the contents of the register (ACC or IX).

DEC <register> Subtract 1 from the contents of the register (ACC or IX).

CMP <address> Compare contents of ACC with contents of <address>.

JPE <address> Following a compare instruction, jump to <address> if the compare was True.

JPN <address> Following a compare instruction, jump to <address> if the compare was
False.
JMP <address> Jump to the given address.

OUT Output to screen the character whose ASCII value is stored in ACC.

END Return control to the operating system.

(a) The diagram shows the current contents of a section of main memory and the index register:

60 0011 0010
61 0101 1101
62 0000 0100
63 1111 1001
64 0101 0101
65 1101 1111
66 0000 1101
67 0100 1101
68 0100 0101
69 0100 0011
...
1000 0110 1001

Index register: 0 0 0 0 1 0 0 0

© UCLES 2016 9608/11/M/J/16


13

(i) Show the contents of the Accumulator after the execution of the instruction:

LDX 60

Accumulator:

Show how you obtained your answer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Show the contents of the index register after the execution of the instruction:

DEC IX

Index register:
[1]

© UCLES 2016 9608/11/M/J/16 [Turn over


14

(b) Complete the trace table on the opposite page for the following assembly language program.

50 LDD 100

51 ADD 102

52 STO 103

53 LDX 100

54 ADD 100

55 CMP 101

56 JPE 58

57 JPN 59

58 OUT

59 INC IX

60 LDX 98

61 ADD 101

62 OUT

63 END

...

100 20

101 100

102 1

103 0

IX (Index Register) 1

Selected values from the ASCII character set:

ASCII Code 118 119 120 121 122 123 124 125
Character v w x y z { | }

© UCLES 2016 9608/11/M/J/16


15

Trace table:

Memory address
Instruction Working ACC IX OUTPUT
address space 100 101 102 103

20 100 1 0 1

50

51

52

53

54

55

[7]

© UCLES 2016 9608/11/M/J/16


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 9608/11/M/J/16


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 1 2 8 1 8 2 2 1 3 0 *

COMPUTER SCIENCE 9608/13


Paper 1 Theory Fundamentals October/November 2015
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.

The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 12 printed pages.

DC (ST/SG) 118026
© UCLES 2015 [Turn over
2

1 (a) Explain the term bit streaming.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) A person watches a film streamed from a website on a tablet computer.

(i) Give two benefits of using bit streaming for this purpose.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(ii) State two potential problems of using bit streaming for this purpose.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(c) Explain the terms on-demand bit streaming and real-time bit streaming.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2015 9608/13/O/N/15


3

2 (a)
Processor

Registers

System clock

B Control
unit ALU C
A

Main memory

The diagram above shows a simplified form of processor architecture.

Name the three buses labelled A, B and C.

A ...............................................................................................................................................

B ...............................................................................................................................................

C ...............................................................................................................................................
[3]

(b) State the role of each of the following special purpose registers used in a typical processor.

Program Counter ......................................................................................................................

...................................................................................................................................................

Memory Data Register ..............................................................................................................

...................................................................................................................................................

Current Instruction Register ......................................................................................................

...................................................................................................................................................

Memory Address Register ........................................................................................................

...................................................................................................................................................
[4]

© UCLES 2015 9608/13/O/N/15 [Turn over


4

3 (a) The table shows four statements about IP addresses.

Tick (✓) to show which of the statements are true.

Statement True (✓)


The IP address consists of any number of digits separated by
single dots (.)
Each number in an IP address can range from 0 to 255
IP addresses are used to ensure that messages and data reach
their correct destinations
Public IP addresses are considered to be more secure than private
IP addresses
[2]

(b) Consider the URL:

http://cie.org.uk/computerscience.html

(i) Give the meaning of the following parts of the URL.

http ....................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

cie.org.uk ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

computerscience.html .......................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

(ii) Sometimes the URL contains the characters %20 and ?.

Describe the function of these characters.

%20 ...................................................................................................................................

...........................................................................................................................................

? ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2015 9608/13/O/N/15


5

4 Paul works part-time for a large software company. The company sells security software to
a number of banks. He also runs his own software company that produces and sells computer
games.

Six statements about computer ethics are shown below.

Draw lines to indicate whether each statement describes ethical or unethical behaviour.

Statement

To save time, Paul fakes the test results


when testing the bank security software.

Paul uses the software developed in his


day job to help write some of the games
software routines.

Ethical

To allow him to concentrate on his games


software, Paul has frequently turned down
job opportunities in his day job.

To make the games software more


realistic, Paul uses password protection
code used in the bank security software.

Unethical
Because his work load is increasing, Paul
is now using overseas companies to write
some of the routines used in his games
software.

Paul carries out training on how to write


games software in his spare time.

[6]

© UCLES 2015 9608/13/O/N/15 [Turn over


6

5 A computer system in a control room is used to monitor earthquake activity.

An earthquake zone has a number of sensors to detect seismic activity.

The system detects when seismic activity is greater than 3 on the Richter Scale. Whenever this
happens, a printer in the control room prints a report.

(i) Identify the steps that are required in this monitoring system.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[4]

(ii) When the system detects high activity, operators may need to respond rapidly. A printer
is useful for hard copies, but may not be the best way to inform operators.

Give a reason why.

...........................................................................................................................................

.......................................................................................................................................[1]

(iii) Name an alternative output device for this monitoring system and give a reason for your
choice.

Output device ....................................................................................................................

Reason for choice .............................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2015 9608/13/O/N/15


7

6 A company operates a chemical plant, which has a number of processes. Local computers monitor
these processes and collect data.

The computers transfer these data to a central computer 50 km away. A telecommunications


company (telco) provides cables.

Engineers at the telco had to decide which type of cable to use. They considered the use of either
copper cable or fibre optic cable.

State two benefits of each type of cable. Each benefit must be clearly different.

Benefits of copper cable

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

Benefits of fibre optic cable

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................
[4]

© UCLES 2015 9608/13/O/N/15 [Turn over


8

7 (a) (i) Describe what is meant by a client-server model of networked computers.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Give two benefits of using the client-server model.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(b) The diagram shows a computer network with connection to the Internet.

client computer client computer


Internet

file server

mail server

Name the hardware device labelled X.

...............................................................................................................................................[1]

© UCLES 2015 9608/13/O/N/15


9

(c) A web page offers a link for users to request another web page. The requested web page
contains HTML code and JavaScript code.

Put each statement in the correct sequence by writing the numbers 1 to 5 in the right-hand
column.

Sequence
Statement
number

The requested web page is displayed on the client computer

The user clicks on the hyperlink and the web page is requested
from the web server

The requested web page content is transmitted to the client


computer

The client computer processes the JavaScript code using the


web browser software

The web server locates the requested web page

[5]

© UCLES 2015 9608/13/O/N/15 [Turn over


10

8 (a) Six computer graphics terms and seven descriptions are shown below.

Draw a line to link each term to its correct description.

Term Description

Measured in dots per inch (dpi); this


value determines the amount of detail
an image has

Bitmap graphic

Picture element

Image file header

Image made up of rows and columns of


picture elements

Image resolution

Image made up of drawing objects. The


properties of each object determine its
shape and appearance.

Pixel

Specifies the image size, number of


colours, and other data needed to
display the image data

Screen resolution

Number of samples taken per second to


represent some event in a digital format

Vector graphic
Value quoted for a monitor specification,
such as 1024 × 768. The larger the
numbers, the more picture elements will
be displayed.

[6]

© UCLES 2015 9608/13/O/N/15


11

(b) (i) A black and white image is 512 pixels by 256 pixels.

Calculate the file size of this image in kilobytes (KB) (1 KB = 1024 bytes).
Show your working.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Give a reason why it is important to estimate the file size of an image.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[1]

9 (a) Give a brief description of each of the following terms:

Validation ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Verification ................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Data are to be transferred between two devices. Parity checks are carried out on the data.

Explain what is meant by a parity check. Give an example to illustrate your answer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]
© UCLES 2015 9608/13/O/N/15 [Turn over
12

10 (a) Explain the term computer virus.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) A virus checker has been installed on a PC.

Give two examples of when a virus checker should perform a check.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

11 A game program is written which can be either interpreted or compiled. The table below shows five
statements about the use of interpreters and compilers.

Tick (✓) to show whether the statement refers to an interpreter or to a compiler.

Statement Interpreter Compiler


This translator creates an executable file
When this translator encounters a syntax error, game
execution halts
The translator analyses and checks each line just before
executing it
This translator will produce faster execution of the game
program
Use of this translator makes it more difficult for the user to
modify the code of the game
[5]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 9608/13/O/N/15


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 8 6 6 9 8 3 6 0 5 9 *

COMPUTER SCIENCE 9608/12


Paper 1 Theory Fundamentals October/November 2015
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 12 printed pages.

DC (ST/SW) 93611/4
© UCLES 2015 [Turn over
2

1 (a) Examples of primary and secondary storage devices include:

• hard disk
• DVD-RW
• flash memory

For each device, describe the type of media used.

Hard disk ...................................................................................................................................

...................................................................................................................................................

DVD-RW ...................................................................................................................................

...................................................................................................................................................

Flash memory ...........................................................................................................................

...............................................................................................................................................[3]

(b) Describe the internal operation of the following devices:

DVD-RW ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DVD-RAM .................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2015 9608/12/O/N/15


3

2 (a) Describe how a laser mouse operates.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) The following table shows a list of five statements which describe the stages when a page is
printed using an inkjet printer.

Put each statement in the correct sequence by writing the numbers 1 to 5 in the right-hand
column.

Sequence
Statement
number
Paper feed stepper motor activated; sheet of paper fed from
paper tray
Printer driver translates data into a suitable format for the
printer
The print head moves across the page; ink is sprayed each
time the print head pauses for a fraction of a second
Paper feed stepper motor advances paper a fraction of a
cm after each complete head pass
Printer receives data from the computer and stores the data
in the printer’s buffer
[5]

© UCLES 2015 9608/12/O/N/15 [Turn over


4

3 A touch screen has three squares where a selection can be made:

S T U

(a) The x-coordinate of the centre of the three squares is held in three memory locations:

Address Memory contents


S 40 0000 1011 0100
T 41 0010 0101 0100
U 42 0100 0110 1100

(i) Give the hexadecimal value of the memory contents for U.

...........................................................................................................................................

.......................................................................................................................................[1]

(ii) Convert the denary number 40 into binary.

...........................................................................................................................................

.......................................................................................................................................[1]

(b) Bitmap graphics are used to represent squares S, T and U.

These can be saved in a number of different image resolutions.

(i) Give the number of bits required to store each pixel for a black and white bitmap.

.......................................................................................................................................[1]

(ii) Identify how many bits are required to store each pixel for a 256-colour bitmap.

Explain your answer.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2015 9608/12/O/N/15


5

4 (a) Sound can be represented digitally in a computer.

Explain the terms sampling resolution and sampling rate.

Sampling resolution ..................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Sampling rate ............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) The following information refers to a music track being recorded on a CD:

• music is sampled 44 100 times per second


• each sample is 16 bits
• each track requires sampling for left and right speakers

(i) Calculate the number of bytes required to store one second of sampled music.
Show your working.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) A particular track is four minutes long.

Describe how you would calculate the number of megabytes required to store this track.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2015 9608/12/O/N/15 [Turn over


6

(c) When storing music tracks in a computer, the MP3 format is often used. This reduces file size
by about 90%.

Explain how the music quality is apparently retained.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

5 Bobby is a senior programmer at a software house which produces intruder detection software.
He also runs his own software company which develops and sells various computer applications.

The following table shows seven activities which Bobby carries out.

Put a tick (✓) in the appropriate column to identify if the activity is ethical or unethical.

Activity Ethical Unethical


Gives away passwords used in the intruder detection
software
Uses source code developed at the software house for
the software he develops for his own company

Insists that staff work to deadlines

Turns down training opportunities offered by his


employer
Writes and sells software that reads confidential data
from client computers

Fakes test results of safety-critical software

Has the software applications developed overseas for


sale in his own country
[7]

© UCLES 2015 9608/12/O/N/15


7

6 (a) Describe the stored program concept for the basic Von Neumann model for a computer
system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) (i) Name the three types of bus used by a processor.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

(ii) State the function of the system clock in a processor.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[1]

© UCLES 2015 9608/12/O/N/15 [Turn over


8

7 An amusement park has a website. This includes a page where potential visitors can enquire
about the price for an individual or group visit.

The user can enter the number of people in their group.

The admission price will be calculated and displayed.

1 <html>
2 <head>
3 <title>Amusement park visit ticket cost</title>
4 </head>
5 <body>
6 Calculate my ticket price
7 <Script Language = "JavaScript">
8 var groupSize = prompt("Enter number of visitors in
your group)", "");
9 var groupPrice = groupSize * 20;
10 if (groupSize > 4)
11 {
12 groupPrice = groupPrice * 0.8;
13 }
14 alert("Price for the group is " + groupPrice);
15 alert("Thank you for your enquiry");
16 </Script>
17 </body>
18 </html>

© UCLES 2015 9608/12/O/N/15


9

(a) Give the range of line numbers in the web page script that are JavaScript code.

...............................................................................................................................................[1]

(b) (i) Give the identifiers of two variables which have been used by the programmer.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(ii) Give the range of line numbers where selection is performed.

.......................................................................................................................................[1]

(c) Explain the use of the following in JavaScript.

(i) the prompt function

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) the var keyword

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2015 9608/12/O/N/15 [Turn over


10

8 Verification and validation can be applied during data entry.

Describe what is meant by these terms. For each method, explain why it is needed.

Verification ........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Validation ..........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2015 9608/12/O/N/15


11

9 (a) An IP address has the following value:

11.64.255.90

(i) Write the above IP address in hexadecimal.

.......................................................................................................................................[4]

(ii) Explain the format of an IP address.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(b) Study the following sentence:

“When a user enters a URL into their web browser, the DNS service locates the required
resource.”

Explain how a URL and DNS are used to locate a resource.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2015 9608/12/O/N/15 [Turn over


12

10 Before it is used, a hard disk is formatted using disk formatter software.

(a) Explain why formatting is needed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Eventually, the performance of the hard disk deteriorates.

Name three other utility programs that might be required. State why each is needed.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 9608/12/O/N/15


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 0 2 7 1 3 7 8 5 0 1 *

COMPUTER SCIENCE 9608/11


Paper 1 Theory Fundamentals October/November 2015
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.

The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 12 printed pages.

DC (CW/SG) 112120/2
© UCLES 2015 [Turn over
2

1 (a) Explain the term bit streaming.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) A person watches a film streamed from a website on a tablet computer.

(i) Give two benefits of using bit streaming for this purpose.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(ii) State two potential problems of using bit streaming for this purpose.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(c) Explain the terms on-demand bit streaming and real-time bit streaming.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2015 9608/11/O/N/15


3

2 (a)
Processor

Registers

System clock

B Control
unit ALU C
A

Main memory

The diagram above shows a simplified form of processor architecture.

Name the three buses labelled A, B and C.

A ...............................................................................................................................................

B ...............................................................................................................................................

C ...............................................................................................................................................
[3]

(b) State the role of each of the following special purpose registers used in a typical processor.

Program Counter ......................................................................................................................

...................................................................................................................................................

Memory Data Register ..............................................................................................................

...................................................................................................................................................

Current Instruction Register ......................................................................................................

...................................................................................................................................................

Memory Address Register ........................................................................................................

...................................................................................................................................................
[4]

© UCLES 2015 9608/11/O/N/15 [Turn over


4

3 (a) The table shows four statements about IP addresses.

Tick (✓) to show which of the statements are true.

Statement True (✓)


The IP address consists of any number of digits separated by
single dots (.)
Each number in an IP address can range from 0 to 255
IP addresses are used to ensure that messages and data reach
their correct destinations
Public IP addresses are considered to be more secure than private
IP addresses
[2]

(b) Consider the URL:

http://cie.org.uk/computerscience.html

(i) Give the meaning of the following parts of the URL.

http ....................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

cie.org.uk ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

computerscience.html .......................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

(ii) Sometimes the URL contains the characters %20 and ?.

Describe the function of these characters.

%20 ...................................................................................................................................

...........................................................................................................................................

? ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2015 9608/11/O/N/15


5

4 Paul works part-time for a large software company. The company sells security software to
a number of banks. He also runs his own software company that produces and sells computer
games.

Six statements about computer ethics are shown below.

Draw lines to indicate whether each statement describes ethical or unethical behaviour.

Statement

To save time, Paul fakes the test results


when testing the bank security software.

Paul uses the software developed in his


day job to help write some of the games
software routines.

Ethical

To allow him to concentrate on his games


software, Paul has frequently turned down
job opportunities in his day job.

To make the games software more


realistic, Paul uses password protection
code used in the bank security software.

Unethical
Because his work load is increasing, Paul
is now using overseas companies to write
some of the routines used in his games
software.

Paul carries out training on how to write


games software in his spare time.

[6]

© UCLES 2015 9608/11/O/N/15 [Turn over


6

5 A computer system in a control room is used to monitor earthquake activity.

An earthquake zone has a number of sensors to detect seismic activity.

The system detects when seismic activity is greater than 3 on the Richter Scale. Whenever this
happens, a printer in the control room prints a report.

(i) Identify the steps that are required in this monitoring system.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[4]

(ii) When the system detects high activity, operators may need to respond rapidly. A printer
is useful for hard copies, but may not be the best way to inform operators.

Give a reason why.

...........................................................................................................................................

.......................................................................................................................................[1]

(iii) Name an alternative output device for this monitoring system and give a reason for your
choice.

Output device ....................................................................................................................

Reason for choice .............................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2015 9608/11/O/N/15


7

6 A company operates a chemical plant, which has a number of processes. Local computers monitor
these processes and collect data.

The computers transfer these data to a central computer 50 km away. A telecommunications


company (telco) provides cables.

Engineers at the telco had to decide which type of cable to use. They considered the use of either
copper cable or fibre optic cable.

State two benefits of each type of cable. Each benefit must be clearly different.

Benefits of copper cable

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

Benefits of fibre optic cable

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................
[4]

© UCLES 2015 9608/11/O/N/15 [Turn over


8

7 (a) (i) Describe what is meant by a client-server model of networked computers.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Give two benefits of using the client-server model.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(b) The diagram shows a computer network with connection to the Internet.

client computer client computer


Internet

file server

mail server

Name the hardware device labelled X.

...............................................................................................................................................[1]

© UCLES 2015 9608/11/O/N/15


9

(c) A web page offers a link for users to request another web page. The requested web page
contains HTML code and JavaScript code.

Put each statement in the correct sequence by writing the numbers 1 to 5 in the right-hand
column.

Sequence
Statement
number

The requested web page is displayed on the client computer

The user clicks on the hyperlink and the web page is requested
from the web server

The requested web page content is transmitted to the client


computer

The client computer processes the JavaScript code using the


web browser software

The web server locates the requested web page

[5]

© UCLES 2015 9608/11/O/N/15 [Turn over


10

8 (a) Six computer graphics terms and seven descriptions are shown below.

Draw a line to link each term to its correct description.

Term Description

Measured in dots per inch (dpi); this


value determines the amount of detail
an image has

Bitmap graphic

Picture element

Image file header

Image made up of rows and columns of


picture elements

Image resolution

Image made up of drawing objects. The


properties of each object determine its
shape and appearance.

Pixel

Specifies the image size, number of


colours, and other data needed to
display the image data

Screen resolution

Number of samples taken per second to


represent some event in a digital format

Vector graphic
Value quoted for a monitor specification,
such as 1024 × 768. The larger the
numbers, the more picture elements will
be displayed.

[6]

© UCLES 2015 9608/11/O/N/15


11

(b) (i) A black and white image is 512 pixels by 256 pixels.

Calculate the file size of this image in kilobytes (KB) (1 KB = 1024 bytes).
Show your working.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Give a reason why it is important to estimate the file size of an image.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[1]

9 (a) Give a brief description of each of the following terms:

Validation ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Verification ................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Data are to be transferred between two devices. Parity checks are carried out on the data.

Explain what is meant by a parity check. Give an example to illustrate your answer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]
© UCLES 2015 9608/11/O/N/15 [Turn over
12

10 (a) Explain the term computer virus.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) A virus checker has been installed on a PC.

Give two examples of when a virus checker should perform a check.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

11 A game program is written which can be either interpreted or compiled. The table below shows five
statements about the use of interpreters and compilers.

Tick (✓) to show whether the statement refers to an interpreter or to a compiler.

Statement Interpreter Compiler


This translator creates an executable file
When this translator encounters a syntax error, game
execution halts
The translator analyses and checks each line just before
executing it
This translator will produce faster execution of the game
program
Use of this translator makes it more difficult for the user to
modify the code of the game
[5]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 9608/11/O/N/15


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 1 4 2 4 6 5 1 9 2 4 *

COMPUTER SCIENCE 9608/13


Paper 1 Theory Fundamentals May/June 2015
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 16 printed pages.

DC (AC/SG) 101101/3
© UCLES 2015 [Turn over
2

1 (a) (i) Using two’s complement, show how the following denary numbers could be stored in an
8-bit register:

124

–77
[2]

(ii) Convert the two numbers in part (a) (i) into hexadecimal.

124 ..................................................................................................................................

–77 ...................................................................................................................................
[2]

(b) Binary Coded Decimal (BCD) is another way of representing numbers.

(i) Write the number 359 in BCD form.

...................................................................................................................................... [1]

(ii) Describe a use of BCD number representation.

...........................................................................................................................................

...................................................................................................................................... [2]

© UCLES 2015 9608/13/M/J/15


3

2 Assemblers translate from assembly language to machine code. Some assemblers scan the
assembly language program twice; these are referred to as two-pass assemblers.

The following table shows five activities performed by two-pass assemblers.

Write 1 or 2 to indicate whether the activity is carried out during the first pass or during the second
pass.

First pass or
Activity
second pass

any symbolic address is replaced by an absolute address

any directives are acted upon

any symbolic address is added to the symbolic address table

data items are converted into their binary equivalent

forward references are resolved

[5]

© UCLES 2015 9608/13/M/J/15 [Turn over


4

3 (a) Give the definition of the terms firewall and authentication. Explain how they can help with the
security of data.

Firewall .....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Authentication ...........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

(b) Describe two differences between data integrity and data security.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(c) Data integrity is required at the input stage and also during transfer of the data.

(i) State two ways of maintaining data integrity at the input stage. Use examples to help
explain your answer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

© UCLES 2015 9608/13/M/J/15


5

(ii) State two ways of maintaining data integrity during data transmission. Use examples to
help explain your answer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

© UCLES 2015 9608/13/M/J/15 [Turn over


6

4 (a) There are two types of RAM: dynamic RAM (DRAM) and static RAM (SRAM).

Five statements about DRAM and SRAM are shown below.

Draw a line to link each statement to the appropriate type of RAM.

Statement Type of RAM

requires data to be refreshed


periodically in order to retain
the data

has more complex circuitry


DRAM

does not need to be refreshed


as the circuit holds the data as
long as the power supply is on

requires higher power


consumption which is SRAM
significant when used in
battery-powered devices

used predominantly in cache


memory of processors where
speed is important

[5]

© UCLES 2015 9608/13/M/J/15


7

(b) Describe three differences between RAM and ROM.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

(c) DVD-RAM and flash memory are two examples of storage devices.

Describe two differences in how they operate.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© UCLES 2015 9608/13/M/J/15 [Turn over


8

5 (a) Name and describe three buses used in the von Neumann model.

Bus 1 .........................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Bus 2 .........................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Bus 3 .........................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

(b) The sequence of operations shows, in register transfer notation, the fetch stage of the fetch-
execute cycle.

1 MAR ← [PC]
2 PC ← [PC] + 1
3 MDR ← [[MAR]]
4 CIR ← [MDR]

• [register] denotes contents of the specified register or memory location


• step 1 above is read as “the contents of the Program Counter are copied to the Memory
Address Register”

(i) Describe what is happening at step 2.

...........................................................................................................................................

...................................................................................................................................... [1]

(ii) Describe what is happening at step 3.

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [1]

© UCLES 2015 9608/13/M/J/15


9

(iii) Describe what is happening at step 4.

...........................................................................................................................................

...................................................................................................................................... [1]

(c) Describe what happens to the registers when the following instruction is executed:

LDD 35

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(d) (i) Explain what is meant by an interrupt.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

(ii) Explain the actions of the processor when an interrupt is detected.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [4]

© UCLES 2015 9608/13/M/J/15 [Turn over


10

6 (a) Three digital sensors A, B and C are used to monitor a process. The outputs from the sensors
are used as the inputs to a logic circuit.

A signal, X, is output from the logic circuit:

B logic circuit output X

Output, X, has a value of 1 if either of the following two conditions occur:

• sensor A outputs the value 1 OR sensor B outputs the value 0

• sensor B outputs the value 1 AND sensor C outputs the value 0

Draw a logic circuit to represent these conditions.

B X

[5]

© UCLES 2015 9608/13/M/J/15


11

(b) Complete the truth table for the logic circuit described in part (a).

Working Space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2015 9608/13/M/J/15 [Turn over


12

(c) Write a logic statement that describes the following logic circuit.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]
© UCLES 2015 9608/13/M/J/15
13

Question 7 begins on page 14.

© UCLES 2015 9608/13/M/J/15 [Turn over


14

7 The table shows assembly language instructions for a processor which has one general purpose
register, the Accumulator (ACC).

Instruction
Explanation
Op code Operand

LDD <address> Direct addressing. Load contents of given address to ACC

STO <address> Store the contents of ACC at the given address

Indirect addressing. The address to be used is at the given


LDI <address>
address. Load the contents of this second address to ACC

Indexed addressing. Form the address from <address> +


LDX <address> the contents of the index register. Copy the contents of this
calculated address to ACC

INC <register> Add 1 to contents of the register (ACC)

JMP <address> Jump to the given address

END Return control to operating system

The diagram shows the contents of the memory.

Main memory

120 0000 1001

121 0111 0101

122 1011 0110

123 1110 0100

124 0111 1111

125 0000 0001

126 0100 0001

127 0110 1001

200 1000 1000

© UCLES 2015 9608/13/M/J/15


15

(a) (i) Show the contents of the Accumulator after execution of the instruction:

LDD 121

Accumulator:

[1]

(ii) Show the contents of the Accumulator after execution of the instruction:

LDI 124

Accumulator:

Explain how you arrived at your answer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

(iii) Show the contents of the Accumulator after execution of the instruction:

LDX 120

Index Register: 0 0 0 0 0 1 1 0

Accumulator:

Explain how you arrived at your answer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

© UCLES 2015 9608/13/M/J/15 [Turn over


16

(b) Trace the assembly language program using the trace table.

300 LDD 321


301 INC
302 STO 323
303 LDI 307
304 INC
305 STO 322
306 END
307 320

320 49
321 36
322 0
323 0

Trace table:

Memory address
Accumulator
320 321 322 323

49 36 0 0

[6]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 9608/13/M/J/15


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 2 2 5 2 4 9 0 2 7 3 *

COMPUTER SCIENCE 9608/12


Paper 1 Theory Fundamentals May/June 2015
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 16 printed pages.

DC (NH/SW) 111425
© UCLES 2015 [Turn over
2

1 (i) Convert the following binary number into hexadecimal.

10111000
...............................................................................................................................................[1]

(ii) Convert the following denary number into BCD format.

97
...............................................................................................................................................[1]

(iii) Using two’s complement, show how the following denary numbers could be stored in an 8-bit
register:

114

- 93
[2]

© UCLES 2015 9608/12/M/J/15


3

2 (a) Sound can be represented in a computer in a digital format.

(i) Give the definition of the term sampling.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[1]

(ii) Give one reason why 16-bit sampling is used in an audio compact disc (CD).

...........................................................................................................................................

.......................................................................................................................................[1]

(iii) Explain what is meant by the term sampling resolution.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(iv) Give one benefit and one drawback of using a higher sampling resolution.

Benefit ...............................................................................................................................

...........................................................................................................................................

Drawback ..........................................................................................................................

.......................................................................................................................................[2]

(b) Describe two typical features found in software for editing sound files.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2015 9608/12/M/J/15 [Turn over


4

(c) Explain the difference between lossless and lossy data compression techniques.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2015 9608/12/M/J/15


5

3 Five modes of addressing and five descriptions are shown below.

Draw a line to connect each mode of addressing to its correct description.

Mode of addressing Description

the operand is the address of the


direct
address of the value to be used

the operand is the address of the value


immediate
to be used

the operand is the offset from the


indexed current address where the value to be
used is stored

the operand plus the contents of the


indirect index register is the address of the value
to be used

relative the operand is the value to be used

[4]

© UCLES 2015 9608/12/M/J/15 [Turn over


6

4 (a) Sensors are one type of input device.

For each of the following situations, name a different sensor that could be used.

(i) air conditioning in an office building

.......................................................................................................................................[1]

(ii) maintaining correct growing conditions in a greenhouse

.......................................................................................................................................[1]

(iii) detecting an intruder in a building

.......................................................................................................................................[1]

(b) Sensors are used to monitor seismic activity. At the end of each day, all the data are
transmitted to a central computer. This is hundreds of kilometres away.

Describe one way of ensuring that the integrity of the data is retained during the transmission
stage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2015 9608/12/M/J/15


7

5 (a) Telephone calls can be made by using:

• conventional telephones (using the Public Service Telephone Network (PSTN) system)
over a wired network
• a computer, equipped with speakers and microphone, connected to the Internet

Put a tick () in the correct column to match each description to the appropriate communication
method.

Conventional telephone
Description Internet-based system
using PSTN
connection only in use
whilst sound is being
transmitted
dedicated channel used
between two points for the
duration of the call
connection maintained
throughout the telephone
call
encoding schemes and
compression technology
used
lines remain active even
during a power outage

[5]

(b) Distinguish between the Internet and the World Wide Web (WWW).

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2015 9608/12/M/J/15 [Turn over


8

(c) Name the hardware device that is being described:

(i) A device that transfers data from one network to another in an intelligent way. It has the
task of forwarding data packets to their destination by the most efficient route.

.......................................................................................................................................[1]

(ii) A device used between two dissimilar LANs. The device is required to convert data
packets from one protocol to another.

.......................................................................................................................................[1]

(iii) A device or software that provides a specific function for computers using a network. The
most common examples handle printing, file storage and the delivery of web pages.

.......................................................................................................................................[1]

© UCLES 2015 9608/12/M/J/15


9

6 (a) Name the most suitable input or output device for each of the following uses.

Give a different device in each case.

Description of use Input or output device

input of credit card number into an online form

selection of an option at an airport information kiosk

output of a single high-quality photograph

output of several hundred high-quality leaflets

input of a hard copy image into a computer

[5]

(b) All of the uses in part (a) involve the input or output of data.

(i) Describe two methods of preventing accidental loss of data.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

.......................................................................................................................................[2]

(ii) Describe one way of ensuring the security of the data against malicious damage.

...........................................................................................................................................

.......................................................................................................................................[1]

© UCLES 2015 9608/12/M/J/15 [Turn over


10

7 A system is monitored using sensors. The sensors output binary values corresponding to physical
conditions, as shown in the table:

Description of Binary
Parameter Description of condition
parameter value
1 pressure >= 3 bar
P oil pressure
0 pressure < 3 bar
1 temperature >= 200°C
T temperature
0 temperature < 200°C
1 rotation <= 1000 revs per minute (rpm)
R rotation
0 rotation > 1000 revs per minute (rpm)

The outputs of the sensors form the inputs to a logic circuit. The output from the circuit, X, is 1 if
any of the following three conditions occur:

either oil pressure >= 3 bar and temperature >= 200°C

or oil pressure < 3 bar and rotation > 1000 rpm

or temperature >= 200°C and rotation > 1000 rpm

(a) Draw a logic circuit to represent the above system.

T X

[5]
© UCLES 2015 9608/12/M/J/15
11

(b) Complete the truth table for this system.

Workspace
P T R X
0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2015 9608/12/M/J/15 [Turn over


12

8 (a) Explain how the width of the data bus and system clock speed affect the performance of a
computer system.

Width of the data bus ................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Clock speed ..............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) Most computers use Universal Serial Bus (USB) ports to allow the attachment of devices.

Describe two benefits of using USB ports.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...............................................................................................................................................[2]

(c) The table shows six stages in the von Neumann fetch-execute cycle.

Put the stages into the correct sequence by writing the numbers 1 to 6 in the right hand
column.

Sequence
Description of stage
number
the instruction is copied from the Memory Data Register (MDR) and placed
in the Current Instruction Register (CIR)

the instruction is executed

the instruction is decoded

the address contained in the Program Counter (PC) is copied to the Memory
Address Register (MAR)
the value in the Program Counter (PC) is incremented so that it points to the
next instruction to be fetched
the instruction is copied from the memory location contained in the Memory
Address Register (MAR) and is placed in the Memory Data Register (MDR)
[6]

© UCLES 2015 9608/12/M/J/15


13

Question 9 begins on page 14.

© UCLES 2015 9608/12/M/J/15 [Turn over


14

9 A database has been designed to store data about salespersons and the products they have sold.

The following facts help to define the structure of the database:

• each salesperson works in a particular shop


• each salesperson has a unique first name
• each shop has one or more salespersons
• each product which is sold is manufactured by one company only
• each salesperson can sell any of the products
• the number of products that each salesperson has sold is recorded

The table ShopSales was the first attempt at designing the database.

FirstName Shop ProductName NoOfProducts Manufacturer


Nick TX television set 3 SKC
refrigerator 2 WP
digital camera 6 HKC
Sean BH hair dryer 1 WG
electric shaver 8 BG
John TX television set 2 SKC
mobile phone 8 ARC
digital camera 4 HKC
toaster 3 GK

(a) State why the table is not in First Normal Form (1NF).

...................................................................................................................................................

...............................................................................................................................................[1]

© UCLES 2015 9608/12/M/J/15


15

(b) The database design is changed to:

SalesPerson (FirstName, Shop)

SalesProducts (FirstName, ProductName, NoOfProducts, Manufacturer)

Using the data given in the first attempt table (ShopSales), show how these data are now
stored in the revised table designs.

Table: SalesPerson

FirstName Shop

Table: SalesProducts

FirstName ProductName NoOfProducts Manufacturer

[3]

© UCLES 2015 9608/12/M/J/15 [Turn over


16

(c) (i) A relationship between the two tables has been implemented.

Explain how this has been done.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Explain why the SalesProducts table is not in Third Normal Form (3NF).

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(iii) Write the table definitions to give the database in 3NF.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 9608/12/M/J/15


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 5 1 9 8 2 0 1 5 2 6 *

COMPUTER SCIENCE 9608/11


Paper 1 Theory Fundamentals May/June 2015
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 16 printed pages.

DC (RW/SW) 93610/2
© UCLES 2015 [Turn over
2

1 (i) Convert the following binary number into hexadecimal.

10111000
...............................................................................................................................................[1]

(ii) Convert the following denary number into BCD format.

97
...............................................................................................................................................[1]

(iii) Using two’s complement, show how the following denary numbers could be stored in an 8-bit
register:

114

- 93
[2]

© UCLES 2015 9608/11/M/J/15


3

2 (a) Sound can be represented in a computer in a digital format.

(i) Give the definition of the term sampling.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[1]

(ii) Give one reason why 16-bit sampling is used in an audio compact disc (CD).

...........................................................................................................................................

.......................................................................................................................................[1]

(iii) Explain what is meant by the term sampling resolution.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(iv) Give one benefit and one drawback of using a higher sampling resolution.

Benefit ...............................................................................................................................

...........................................................................................................................................

Drawback ..........................................................................................................................

.......................................................................................................................................[2]

(b) Describe two typical features found in software for editing sound files.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2015 9608/11/M/J/15 [Turn over


4

(c) Explain the difference between lossless and lossy data compression techniques.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2015 9608/11/M/J/15


5

3 Five modes of addressing and five descriptions are shown below.

Draw a line to connect each mode of addressing to its correct description.

Mode of addressing Description

the operand is the address of the


direct
address of the value to be used

the operand is the address of the value


immediate
to be used

the operand is the offset from the


indexed current address where the value to be
used is stored

the operand plus the contents of the


indirect index register is the address of the value
to be used

relative the operand is the value to be used

[4]

© UCLES 2015 9608/11/M/J/15 [Turn over


6

4 (a) Sensors are one type of input device.

For each of the following situations, name a different sensor that could be used.

(i) air conditioning in an office building

.......................................................................................................................................[1]

(ii) maintaining correct growing conditions in a greenhouse

.......................................................................................................................................[1]

(iii) detecting an intruder in a building

.......................................................................................................................................[1]

(b) Sensors are used to monitor seismic activity. At the end of each day, all the data are
transmitted to a central computer. This is hundreds of kilometres away.

Describe one way of ensuring that the integrity of the data is retained during the transmission
stage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2015 9608/11/M/J/15


7

5 (a) Telephone calls can be made by using:

• conventional telephones (using the Public Service Telephone Network (PSTN) system)
over a wired network
• a computer, equipped with speakers and microphone, connected to the Internet

Put a tick () in the correct column to match each description to the appropriate communication
method.

Conventional telephone
Description Internet-based system
using PSTN
connection only in use
whilst sound is being
transmitted
dedicated channel used
between two points for the
duration of the call
connection maintained
throughout the telephone
call
encoding schemes and
compression technology
used
lines remain active even
during a power outage

[5]

(b) Distinguish between the Internet and the World Wide Web (WWW).

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2015 9608/11/M/J/15 [Turn over


8

(c) Name the hardware device that is being described:

(i) A device that transfers data from one network to another in an intelligent way. It has the
task of forwarding data packets to their destination by the most efficient route.

.......................................................................................................................................[1]

(ii) A device used between two dissimilar LANs. The device is required to convert data
packets from one protocol to another.

.......................................................................................................................................[1]

(iii) A device or software that provides a specific function for computers using a network. The
most common examples handle printing, file storage and the delivery of web pages.

.......................................................................................................................................[1]

© UCLES 2015 9608/11/M/J/15


9

6 (a) Name the most suitable input or output device for each of the following uses.

Give a different device in each case.

Description of use Input or output device

input of credit card number into an online form

selection of an option at an airport information kiosk

output of a single high-quality photograph

output of several hundred high-quality leaflets

input of a hard copy image into a computer

[5]

(b) All of the uses in part (a) involve the input or output of data.

(i) Describe two methods of preventing accidental loss of data.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

.......................................................................................................................................[2]

(ii) Describe one way of ensuring the security of the data against malicious damage.

...........................................................................................................................................

.......................................................................................................................................[1]

© UCLES 2015 9608/11/M/J/15 [Turn over


10

7 A system is monitored using sensors. The sensors output binary values corresponding to physical
conditions, as shown in the table:

Description of Binary
Parameter Description of condition
parameter value
1 pressure >= 3 bar
P oil pressure
0 pressure < 3 bar
1 temperature >= 200°C
T temperature
0 temperature < 200°C
1 rotation <= 1000 revs per minute (rpm)
R rotation
0 rotation > 1000 revs per minute (rpm)

The outputs of the sensors form the inputs to a logic circuit. The output from the circuit, X, is 1 if
any of the following three conditions occur:

either oil pressure >= 3 bar and temperature >= 200°C

or oil pressure < 3 bar and rotation > 1000 rpm

or temperature >= 200°C and rotation > 1000 rpm

(a) Draw a logic circuit to represent the above system.

T X

[5]
© UCLES 2015 9608/11/M/J/15
11

(b) Complete the truth table for this system.

Workspace
P T R X
0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2015 9608/11/M/J/15 [Turn over


12

8 (a) Explain how the width of the data bus and system clock speed affect the performance of a
computer system.

Width of the data bus ................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Clock speed ..............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) Most computers use Universal Serial Bus (USB) ports to allow the attachment of devices.

Describe two benefits of using USB ports.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...............................................................................................................................................[2]

(c) The table shows six stages in the von Neumann fetch-execute cycle.

Put the stages into the correct sequence by writing the numbers 1 to 6 in the right hand
column.

Sequence
Description of stage
number
the instruction is copied from the Memory Data Register (MDR) and placed
in the Current Instruction Register (CIR)

the instruction is executed

the instruction is decoded

the address contained in the Program Counter (PC) is copied to the Memory
Address Register (MAR)
the value in the Program Counter (PC) is incremented so that it points to the
next instruction to be fetched
the instruction is copied from the memory location contained in the Memory
Address Register (MAR) and is placed in the Memory Data Register (MDR)
[6]

© UCLES 2015 9608/11/M/J/15


13

Question 9 begins on page 14.

© UCLES 2015 9608/11/M/J/15 [Turn over


14

9 A database has been designed to store data about salespersons and the products they have sold.

The following facts help to define the structure of the database:

• each salesperson works in a particular shop


• each salesperson has a unique first name
• each shop has one or more salespersons
• each product which is sold is manufactured by one company only
• each salesperson can sell any of the products
• the number of products that each salesperson has sold is recorded

The table ShopSales was the first attempt at designing the database.

FirstName Shop ProductName NoOfProducts Manufacturer


Nick TX television set 3 SKC
refrigerator 2 WP
digital camera 6 HKC
Sean BH hair dryer 1 WG
electric shaver 8 BG
John TX television set 2 SKC
mobile phone 8 ARC
digital camera 4 HKC
toaster 3 GK

(a) State why the table is not in First Normal Form (1NF).

...................................................................................................................................................

...............................................................................................................................................[1]

© UCLES 2015 9608/11/M/J/15


15

(b) The database design is changed to:

SalesPerson (FirstName, Shop)

SalesProducts (FirstName, ProductName, NoOfProducts, Manufacturer)

Using the data given in the first attempt table (ShopSales), show how these data are now
stored in the revised table designs.

Table: SalesPerson

FirstName Shop

Table: SalesProducts

FirstName ProductName NoOfProducts Manufacturer

[3]

© UCLES 2015 9608/11/M/J/15 [Turn over


16

(c) (i) A relationship between the two tables has been implemented.

Explain how this has been done.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Explain why the SalesProducts table is not in Third Normal Form (3NF).

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(iii) Write the table definitions to give the database in 3NF.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 9608/11/M/J/15

You might also like