Cambridge International AS & A Level: Computer Science 9608/12
Cambridge International AS & A Level: Computer Science 9608/12
Cambridge International AS & A Level: Computer Science 9608/12
* 2 6 8 9 5 3 3 7 0 3 *
1 hour 30 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (KN) 188577/1
© UCLES 2020 [Turn over
2
(i) Convert the following denary number into Binary Coded Decimal (BCD).
105
..................................................................................................................................... [1]
(ii) Convert the following two’s complement binary integer into denary.
10111111
..................................................................................................................................... [1]
AB
..................................................................................................................................... [1]
The following tables show part of the ASCII code character set.
(i) Describe how the computer uses ASCII codes to represent characters.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
Bed
...........................................................................................................................................
..................................................................................................................................... [1]
(iii) Give the denary ASCII code for the following character.
..................................................................................................................................... [1]
(a) Describe, using an example, how a text file is compressed using RLE.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Explain why run-length encoding will sometimes increase the size of a text file.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
3 (a) Complete the following statements about CPU architecture by filling in the missing terms.
The Von Neumann model for a computer system uses the ....................................... program
concept.
....................................... it.
The processor uses several ....................................... to store the data and instructions from
the program because they can be accessed faster than main memory.
[6]
BLANK PAGE
(b) The following table shows assembly language instructions for a processor that has one
general purpose register, the Accumulator (ACC).
Instruction
Explanation
Op code Operand
Direct addressing. Load the contents of the location at the given address to
LDD <address>
ACC.
LDM #n Immediate addressing. Load the denary number n to ACC.
Indirect addressing. The address to be used is at the given address. Load the
LDI <address>
contents of this second address to ACC.
STO <address> Store contents of ACC at the given address.
CMP <address> Compare the contents of ACC with the contents of <address>.
OUT Output to screen the character whose ASCII value is stored in ACC.
JPE <address> Following a compare instruction, jump to <address> if the compare was True.
Following a compare instruction, jump to <address> if the compare was
JPN <address>
False.
END Return control to the operating system.
80 10
81 2
82 0
Trace the program currently in memory using the following trace table.
The first instruction has been completed for you.
10 2 0
50 10
[5]
Tick (✓) one box in each column to identify the appropriate instruction group for each of
the three assembly language instructions.
Data movement
Arithmetic operations
Compare instructions
[3]
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(b) Describe the difference between the operation of an AND gate and a NAND gate.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
© UCLES 2020 9608/12/O/N/20
9
5 A teacher uses a relational database, RESULTS, to store data about her students and their test
results.
(a) Describe the benefits to the teacher of using a relational database instead of a file-based
approach.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) The teacher sets up the RESULTS database using a Database Management System (DBMS).
(i) Explain the ways in which the developer interface of a DBMS will help the teacher set up
the database.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) The DBMS creates a data dictionary for the RESULTS database.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(i) Complete the following table by giving one example of each database term from the
database RESULTS. Give both the field name and the corresponding table name.
Primary key
Foreign key
Attribute
[3]
(ii) Tick (✓) one box to identify whether the database RESULTS is in 1NF, 2NF or 3NF.
Justify your choice.
Justification: ......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(iii) Complete the Data Manipulation Language (DML) script to display the Student ID, mark
and maximum marks for all tests with the topic of ‘Programming’.
(iv) The teacher wants to implement validation to make sure that all data entered into the
database RESULTS are reasonable.
Name three different methods of data validation that can be used in the RESULTS
database. Describe how each method will limit the data that can be entered in this
database.
Method 1 ...........................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
Method 2 ...........................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
Method 3 ...........................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
[6]
(d) The teacher stores the database on the desktop computer in her classroom.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Explain the ways in which the teacher can use data backup and disk mirroring to limit the
amount of data lost in the event of hardware failure.
Data backup
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Disk mirroring
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
© UCLES 2020 9608/12/O/N/20 [Turn over
12
(a) Malika’s manager has asked her to work with a senior software engineer for the first week.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Malika researched the company and the programming languages used by the company
before she started the job.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) Malika thinks that her colleagues do not like her, so she asks her manager for help.
Describe the actions the manager could take to support Malika in an ethical way.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Characteristic IP address
IPv6
[2]
Explain the reasons for the web server using a static instead of a dynamic IP address.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.