Escolar Documentos
Profissional Documentos
Cultura Documentos
Mushtaq Hussain
9691/03
COMPUTING
Paper 3 Written
SPECIMEN PAPER
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
For Examiner's Use
Do not use staples, paper clips, highlighters, glue or correction fluid.
1
Answer all questions.
2
No marks will be awarded for using brand names of software packages or
hardware.
3
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part
4
question.
5
6
7
8
9
Total
UCLES 2010
[Turn over
Contact the Teacher: 03215275281
M.Mushtaq Hussain
3
2
For
Examiner's
Use
Draw an entity relationship (ER) diagram to represent this data model in third normal
form and label the relationships.
[7]
(b) Using examples from this database, explain what is meant by:
(i) a primary key,
[2]
(ii) a secondary key,
[2]
(iii) a foreign key.
[2]
UCLES 2010
9691/03/SP/11
[Turn over
M.Mushtaq Hussain
4
3
(a) Explain why an interpreter may be preferred to a compiler as a translator when writing
a high-level language program.
[5]
(b) Describe how the code is checked during the syntax analysis stage of compilation.
[3]
4
The contents of the Current Instruction Register (CIR) for one instruction are
ADD 01011011
(Note: The ADD operation would normally be stored as a binary code.)
(i) Explain what is meant by a mnemonic and why it is used.
[3]
UCLES 2010
9691/03/SP/11
For
Examiner's
Use
M.Mushtaq Hussain
5
(ii) Describe how this address is used if it is an indirect address.
For
Examiner's
Use
[2]
(iii) Describe how this address is used if it is an indexed address.
[2]
(iv) The address is actually an immediate operand which is to be added to the value
01011101 which is held in the accumulator.
Carry out this addition, showing your working.
[3]
UCLES 2010
9691/03/SP/11
[Turn over
M.Mushtaq Hussain
8
6
For
Examiner's
Use
(ii) paging,
UCLES 2010
9691/03/SP/11
[9]
M.Mushtaq Hussain
12
9
An import/export company is based in two offices in London and Lahore. Each office has an
accounts department and a warehousing department. Each department has a network of
computers. It is important that at each office the accounts and warehousing departments
must be able to communicate. The London and Lahore offices must also be able to
communicate electronically.
With reference to this example, explain the use of the following:
(i) copper cabling,
[2]
(ii) wireless communication,
[2]
(iii) routers,
[2]
(iv) bridges,
[2]
UCLES 2010
9691/03/SP/11
For
Examiner's
Use
M.Mushtaq Hussain
13
(v) modems.
For
Examiner's
Use
[2]
UCLES 2010
9691/03/SP/11
M.Mushtaq Hussain
*7081239771*
9691/31
COMPUTING
May/June 2011
Paper 3
2 hours
Candidates answer on the Question Paper.
No additional materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names for software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
[Turn over
Contact the Teacher: 03215275281
M.Mushtaq Hussain
2
1
Name three different types of bus in a processor and state what each is used for.
For
Examiner's
Use
[6]
2
(a) Explain the relationship between assembly languages and machine code.
[2]
(b) Describe how an assembler produces machine code from assembly language.
[2]
UCLES 2011
9691/31/M/J/11
M.Mushtaq Hussain
3
(c) The address part of a low-level instruction can be the address of the data to be used.
This is a direct address.
Describe the following types of addressing:
For
Examiner's
Use
[2]
(ii) Indexed addressing;
[2]
(iii) Relative addressing.
[2]
UCLES 2011
9691/31/M/J/11
[Turn over
M.Mushtaq Hussain
4
3
[8]
UCLES 2011
9691/31/M/J/11
For
Examiner's
Use
M.Mushtaq Hussain
6
5
For
Examiner's
Use
[2]
(b) (i) State why files which are sent to a shared printer on a local network will be
spooled.
[5]
UCLES 2011
9691/31/M/J/11
M.Mushtaq Hussain
7
6
Describe the purpose of the following parts of a database management system (DBMS).
For
Examiner's
Use
[2]
(ii) Data Manipulation Language (DML)
[3]
7
Part of the information stored in the data dictionary describes the type of data which is
being stored.
A particular piece of data is 10010110.
State what the data stands for if the data dictionary describes it as:
(i) a two's complement binary number;
[1]
(ii) a sign and magnitude binary number;
[1]
(iii) a binary coded decimal number.
[2]
UCLES 2011
9691/31/M/J/11
[Turn over
M.Mushtaq Hussain
11
10 A country has a national football competition based on leagues.
Each LEAGUE has a number of TEAMs but each TEAM is only in one LEAGUE.
Each TEAM plays at a number of GROUNDs during the season and each GROUND will
host a number of TEAMs during the season.
For
Examiner's
Use
[2]
(ii) State the relationship between TEAM and GROUND.
[2]
(iii) Explain how the relationship between TEAM and GROUND can be designed in
third normal form.
[4]
UCLES 2011
9691/31/M/J/11
[Turn over
M.Mushtaq Hussain
12
11 (a) Describe the differences between interpretation and compilation of a high-level
language program.
[3]
(b) When a program is run the processor uses special purpose registers.
Describe how the contents of each of the following registers changes during the
fetch-execute cycle:
(i) Memory Address Register (MAR)
[2]
(ii) Memory Data Register (MDR)
[2]
UCLES 2011
9691/31/M/J/11
For
Examiner's
Use
M.Mushtaq Hussain
13
12 A business uses the Internet to communicate with suppliers and to pay bills electronically.
Discuss the problems of maintaining confidentiality of data on the Internet and techniques
that can be used to address these problems.
[6]
UCLES 2011
9691/31/M/J/11
For
Examiner's
Use
M.Mushtaq Hussain
9691 COMPUTING
9691/31
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes must be read in conjunction with the question papers and the report on the
examination.
Cambridge will not enter into discussions or correspondence in connection with these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2011 question papers for most IGCSE,
GCE Advanced Level and Advanced Subsidiary Level syllabuses and some Ordinary Level
syllabuses.
Page 2
1
M.Mushtaq Hussain
Syllabus
9691
Paper
31
e.g.-Data bus
-to carry data from one location to another in processor // e.g. from MDR to CIR
-Address bus
-carries the address of a memory location // e.g. Address of location in memory from MAR
-Control bus
-Carries control signals around processor // to synchronise the operation of the processor
components // by example: memory read/write completed // each line carries a different signal.
Accept: system bus, memory bus, firewire, USB, PCI + explanation
(2nd mark is dependent on correct bus name)
(2 per -, max 6)
[6]
[2]
[2]
[2]
[2]
Page 3
3
M.Mushtaq Hussain
Syllabus
9691
Paper
31
-Coaxial cable
-description/one transmission medium (copper) surrounded by insulation
-Twisted pair
-description/two conducting wires twisted around each other
-Optic fibre
-many fibres contained
-description/fine glass strands carry light signals // optic fibre is very fragile
-Interference free
-Wireless communication
-Radio signals
-open to interception / latency / uses WEP keys for security
-Infrared/Microwave
-restricted by line of sight
-transfer rate statement
-range statement
(1 per -, max 8)
[8]
(a) -A system in which the output is produced quickly enough to affect the next input /current
process
-a system that reacts fast enough to influence behaviour in the outside world
[1]
(b) -A number of sensors stationed around apartment
-Temperature/humidity sensor sends temperature/humidity to processor
-Use analogue to digital converter to convert the temperature/humidity measurements
-Processor decides whether air conditioning system is in operation
-(processor) compares measured temperature/humidity to required temperature/humidity
-If necessary actuator is used to adjust settings/turn on cooling/heating/humidifier
-Delay before next reading is taken from temperature/humidity sensor. // temperature
readings are sampled // taking readings is repeated
-Sensors on windows to warn if they are open during operation.
(1 per -, max 4)
(c) Any suitable real-time or pseudo-real-time application e.g.
-To play a racing game
-So that the player can steer the car realistically
-any reservation type system
-to prevent double booking
[4]
[2]
Page 4
5
M.Mushtaq Hussain
Syllabus
9691
Paper
31
[2]
(b) (i) -Jobs can be queued to ensure that none are missed
-Stops jobs being frozen/lost when printer unavailable
-complete documents are printed
[5]
[2]
[3]
(i) 106
[1]
(ii) 22
[1]
[2]
Page 5
8
M.Mushtaq Hussain
Syllabus
9691
Paper
31
(a) (i) -A dynamic data structure changes size // A static data structure has the same size
-dynamic data structure matches size to data requirements // static data structure takes
no account of data requirements
-dynamic data structure takes memory from heap as required
-static data structure is predefined at compile time
[2]
(ii) Advantage:
-Array is of fixed size which simplifies algorithms // or by example e.g. retrieval of data
-Array controls the maximum size of the queue
Disadvantage:
-Queue held in an array cannot expand beyond the size of the array
-If queue is small then memory space is wasted.
[2]
(b) (i) Either:
Start
FreeSpace
BEV
DON
FRO
ROS
Start: 5
FRO
Start: 4
FRO
NFree: 6
TSI
NFree: 5
TSI
DON
DON
ROS
ROS
BEV
BEV
TSI
[5]
Page 6
M.Mushtaq Hussain
Syllabus
9691
Paper
31
[5]
(a) -reverse Polish expressions can be processed directly from left to right
-Is free of ambiguities
-does not require brackets
-does not require use of rules of precedence
(1 per -, max 2)
(b)
b
a
10
a+b
e
d
c
a+b
*
d-e
c
a+b
[2]
c*(d-e)
a+b
(a+b)-c*(d-e)
Mark points:
-at least two operators shown between transitions
-a and b in first stage
-a+b after first operator
-e,d,c, (a+b) in stack in correct order
-(d-e)
-c*(d-e)
-(a+b)-c*(d-e)
(1 per -, max 6)
[6]
LEAGUE
TEAM
[2]
GROUND
[2]
TEAM
Page 7
M.Mushtaq Hussain
Syllabus
9691
Paper
31
11 (a) -Interpreter translates one instruction, runs it before going on to the next // Compiler
translates all the instructions before run.
-Compiler creates object code/executable file // Interpreter does not
-Interpreter makes for easier debugging
-Compiled programs will execute faster // interpreted code will execute slower
-Interpreter must be present to run the program // compiler not needed at runtime
-Interpreter will translate code in loops more than once // Compiler only once
-once compiled no further translation needed // every program execution requires interpreter
(1 per -, max 3)
[3]
(b) (i) -Contents copied from PC
-Contents changed to the operand/address part of CIR
[2]
(ii) -Instruction copied from memory/location to MDR when contents of MAR are from PC
-Data copied from memory/location to MDR when instruction is LOAD
-Data copied from ALU/Accumulator to MDR when instruction is STORE
[max 2]
12 -Must safeguard against unauthorised access to the computer system
-Firewall used to restrict access to known sources
-Control access to the network using accounts/user IDs with passwords // procedures in place for
authentication
-File contents can be encrypted
-procedures in place to protect against malware
-all payments/communication can be made through a secure connection
-need to safeguard against bogus websites
-Procedures in place for authorisation of resources
-Users allocated access rights to various resources // users have access to certain files/folders
only
-Files can be password protected / read-only
-users can access the network from certain terminals only / certain times of the day only
-use of digital signatures
(1 per -, max 6)
[6]
M.Mushtaq Hussain
*2788786869*
9691/31
COMPUTING
October/November 2011
Paper 3
2 hours
Candidates answer on the Question Paper.
No additional materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names for software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
[Turn over
Contact the Teacher: 03215275281
M.Mushtaq Hussain
2
1
Describe the following components of a typical PC operating system and explain how they
are used.
(a) File allocation table (FAT)
[3]
(b) Boot file
[3]
UCLES 2011
9691/31/O/N/11
For
Examiner's
Use
M.Mushtaq Hussain
3
2
For
Examiner's
Use
[3]
(b) Describe the use of the following special purpose registers and how they change
during the fetch-execute cycle.
(i) Program Counter (PC)
[3]
(ii) Current Instruction Register (CIR)
[3]
UCLES 2011
9691/31/O/N/11
[Turn over
M.Mushtaq Hussain
4
3
(a) Convert the following denary numbers into 10-bit, sign and magnitude, binary numbers:
(i) -390
(ii) -47
[3]
(b) Convert the following denary numbers into 8-bit, two's complement, binary numbers:
(i) +93
[2]
(ii) - 69
[2]
UCLES 2011
9691/31/O/N/11
For
Examiner's
Use
M.Mushtaq Hussain
5
(c) (i) Using the binary values from part (a) work out (-390) + (- 47), giving your answer in
sign and magnitude form using 10-bit binary. You must show your working.
For
Examiner's
Use
[3]
(ii) Using the binary values from part (b), work out 93 - 69, giving your answer in two's
complement form using 8-bit binary. You must show your working.
[4]
UCLES 2011
9691/31/O/N/11
[Turn over
M.Mushtaq Hussain
6
4
A health ministry has decided that it would be useful for doctors in that country to
communicate using an intranet.
Patient records could be shared and advice could be given by the doctors.
(a) Describe what is meant by an intranet.
[3]
(b) Explain why an intranet was used rather than an open network like the World Wide
Web.
[5]
UCLES 2011
9691/31/O/N/11
For
Examiner's
Use
M.Mushtaq Hussain
9
7
(a) Explain the difference between storing data in a flat file and in a relational database.
For
Examiner's
Use
[2]
(b) Data about patients, doctors and treatments in a hospital are stored in a relational
database.
Explain the advantages of using a relational database rather than a flat file to store the
hospital data.
[3]
(c) (i) Explain why access to the data in the database needs to be controlled.
[5]
UCLES 2011
9691/31/O/N/11
[Turn over
M.Mushtaq Hussain
11
9
(a) (i) Describe what happens during the lexical analysis phase of compilation.
For
Examiner's
Use
[4]
(ii) Explain how syntax errors are identified during compilation.
[3]
(b) (i) Explain the value of using library routines when writing new programs.
[2]
(ii) Describe how linkers and loaders are used to make the use of library routines
possible.
[2]
UCLES 2011
9691/31/O/N/11
[Turn over
M.Mushtaq Hussain
Page 2
1
Syllabus
9691
Paper
31
[3]
[3]
[3]
M.Mushtaq Hussain
Page 3
3
Syllabus
9691
Paper
31
[2]
[2]
1110000110
1000101111
1110110101
111
=1 1 1 0 1 1 0 1 0 1
(1 for correct carries, 1 for correct answer (9 bits), 1 for correct msb)
f.t.
(ii)
[3]
[3]
01011101
+10111011
= 100011000
11111111
(1 for correct sum, 1 for correct answer (8 bits), 1 for correct carries, 1 for showing
ignoring ninth bit)
[4]
[5]
M.Mushtaq Hussain
Page 4
5
Syllabus
9691
Paper
31
[4]
(c) -May involve simply changing from one stored program to another
-set new parameters for current program
-edit program/writing new program code
-by physically being moved through intermediate positions
-which the system can then replicate
(1 per -, max 3)
[3]
[6]
M.Mushtaq Hussain
Page 5
7
Syllabus
9691
Paper
31
[2]
(b) -Reduces repetition/duplication of data items // keeps physical volume of data to a minimum
// minimises redundant data
-Increases data integrity // reduces data inconsistency
-(Simpler) data retrieval through queries // reports are easy to generate
-Amending/searching/sorting data is easier
-Amending the data structures (e.g. to include wards) is simpler to implement
-Changes to the data structure will not affect existing applications programs // Program/data
independence
(1 per -, max 3)
(c) (i),(ii)
[3]
[5]
[4]
[4]
M.Mushtaq Hussain
Page 6
9
Syllabus
9691
Paper
31
[4]
[3]
[2]
10 (a) (i) There can only be one <non-zero-digit> before the letter <group>
(ii) X is not defined as a <letter>
(iii) Only one <digit> is allowed after <group>
[3]
(b)
variable-identifier
non-zero-digit
letter
digit
Mark Points:
-Only one entry and one exit point used
-Order correct (non-zero-digit, letter, digit)
-Loop around letter to create group
-Loop around digit to create two options one to include final digit, one to omit final digit
(1 per -, max 4)
[4]
M.Mushtaq Hussain
*7117681918*
9691/33
COMPUTING
October/November 2011
Paper 3
2 hours
Candidates answer on the Question Paper.
No additional materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names for software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
[Turn over
Contact the Teacher: 03215275281
M.Mushtaq Hussain
2
1
For
Examiner's
Use
[2]
(b) Explain how the boot program is used when a PC is turned on.
[4]
UCLES 2011
9691/33/O/N/11
M.Mushtaq Hussain
3
2
For
Examiner's
Use
[3]
(b) Name three types of bus that are used in a computer. For each one explain what it is
used for.
[6]
UCLES 2011
9691/33/O/N/11
[Turn over
M.Mushtaq Hussain
4
3
(a) Convert the following denary numbers into 8-bit, sign and magnitude, binary numbers:
(i) +39
(ii) - 47
[3]
(b) Convert the following denary numbers into 8-bit, two's complement, binary numbers:
(i) - 3
[2]
(ii) - 47
[2]
UCLES 2011
9691/33/O/N/11
For
Examiner's
Use
M.Mushtaq Hussain
5
(c) A particular computer uses a single 10-bit word to store a floating-point representation
of a number.
The first 6 bits are used to store the mantissa and the remaining 4 bits are used to
store the exponent.
(i) Explain why 000101 0100 = 2
1
2
For
Examiner's
Use
[2]
(ii) Rewrite the binary value of this floating-point representation so that it is in
normalised form.
[2]
(iii) 011001 0011 is a normalised floating-point number.
By converting each of the mantissa and the exponent into a denary number first,
write this number in denary.
[3]
UCLES 2011
9691/33/O/N/11
[Turn over
M.Mushtaq Hussain
6
4
The health system in a country consists of a number of local surgeries. Individual doctors
give medical assistance to people in the immediate area. In addition to this there are a
number of main hospitals. Each hospital provides services which the doctors are unable to
provide in their surgeries.
The main hospitals and the surgeries which they serve are linked by using an intranet.
(a) Describe what is meant by an intranet.
[3]
(b) Explain the advantages and disadvantages of using an intranet rather than the Internet.
[5]
UCLES 2011
9691/33/O/N/11
For
Examiner's
Use
M.Mushtaq Hussain
8
6
(a) Describe the advantages of using a relational database to store data rather than a flat
file.
[3]
(b) Data about guests in a hotel are stored in a relational database. One part of the
database consists of a table of GUEST details. This is linked to a table ACCOUNT.
Whenever a guest orders something in the hotel, the charge for that service is stored in
the ACCOUNT table.
(i) State the primary key of the GUEST table, justifying your choice.
[2]
(ii) State a secondary key in the ACCOUNT table, justifying your choice.
[2]
(iii) State what is meant by a foreign key.
[1]
(iv) State a foreign key in the ACCOUNT table, justifying your choice.
[2]
UCLES 2011
9691/33/O/N/11
For
Examiner's
Use
M.Mushtaq Hussain
9
7
(a) Explain how variables are managed during the different stages of compilation of a
high-level language program.
For
Examiner's
Use
[7]
(b) (i) Give two advantages of using a compiler rather than an interpreter to translate a
high-level language program.
[2]
(ii) Describe an advantage of using an interpreter rather than a compiler to translate a
high-level language program.
[2]
UCLES 2011
9691/33/O/N/11
[Turn over
M.Mushtaq Hussain
Page 2
1
Syllabus
9691
Paper
33
[2]
[4]
(a) -during the fetch stage the contents of the address in the MAR is copied into the MDR
-The contents of MDR is the instruction to be used (this is copied to the CIR)
-during the execute stage (store instruction) the contents of the ACC is copied into the MDR
-during the execute stage (load/add instruction) the contents of the memory location is
copied into the MDR
(1 per -, max 3)
[3]
(b) -Data bus carries contents of a memory location/contents of a register/a data value/an
address/an instruction
-Address bus carries an address of a memory location/device
-the address bus carries an address from the processor to main memory/a device
-Control bus
- Separate wires each used to carry a control signal
- the bus carries control signals to the various components
- by example e.g. read operation completed // interrupt
-Data bus is bi-directional // data bus used to read/write data // Address bus is uni-directional
// the control bus is bi-directional
(mark as 3 2 per bus, max 6)
[6]
M.Mushtaq Hussain
Page 3
3
Syllabus
9691
Paper
33
[3]
[2]
[2]
[2]
[2]
[3]
[3]
(b) Advantages
-Limited number of users speeds up access...
-Information being communicated is sensitive/confidential...
-needs protection from being seen by unauthorised people
-Information on system will be relevant/easily updated
-Less information makes it easier to navigate
-easier to control who can access the content
Disadvantages
-may involve additional set-up costs // need to set up a LAN
-extra administration // setting up users (& passwords)/access rights
(1 per -, max 5)
[5]
M.Mushtaq Hussain
Page 4
5
Syllabus
9691
Paper
33
(a) -Cost of creating the real thing == different braking units would need to be built
-Time that would be needed to create the real thing == the parameters of the simulated
braking system can be changed immediately
-Time taken to run the tests == test time can be greatly reduced
-a wide variety of conditions need to be tested == e.g. it may be necessary to drive for
100000 miles/at different speeds, this could be simulated
-Ability to change conditions immediately == e.g. not necessary to transport car to different
parts of the world
-extreme case scenarios can be tested == conditions may never occur during real life testing
(3 x 2 per advantage)
[6]
(b) -Speed
-in order to simulate stopping distances
-Weight of car and load
-in order to simulate the effects of inertia with different loads
-Materials used/size of structure used/methods of fixing to car
-to try to reduce final cost while still remaining efficient
-driving style
-gentle braking/hard braking/cornering/reaction time
-tyres
-wear/type of tread/tyre material
-road surface
-roughness/material
-weather conditions (temperature, wind, precipitation)
-in order to replicate different climates
(1 per -, max 5)
[5]
(a) -Reduces repetition/duplication of data items // keeps physical volume of data to a minimum
// minimises redundant data
-Increases data integrity // reduces data inconsistency
-Simpler data retrieval through queries // reports are easy to generate
-Amending/searching/sorting data is easier
-Amending the data structures is simpler to implement
-Changes to the data structure will not affect existing applications programs // Program/data
independence
(1 per -, max 3)
[3]
(b) (i) -GuestID or similar
-unique
[2]
[1]
(iv) -GuestID
-to link each account to the relevant guest // to link ACCOUNT and GUEST tables
[2]
M.Mushtaq Hussain
Page 5
7
Syllabus
9691
Paper
33
[7]
[2]
Paging
-memory is divided into equal-sized units called page frames
-program/data file is divided into equal-size units called pages
-one or more pages may be loaded into memory at any one time
-Pages may be discontiguous
-Pages swapped in and out as required
-pages not in main memory are stored in virtual memory/backing store
-page table/Index of pages/processes kept
-absolute address is calculated by adding page address to relative address in instruction
-paging is transparent to the programmer
Segmentation
-Memory is divided into variable length blocks
-Programs can consist of many segments
-Segments normally match natural divide in jobs/logical blocks
-Index of segments stored which must
-store base address and length of segment
-programmer will organise code modules into segments
(1 per -, max 4 per dotty, max 6)
[6]
M.Mushtaq Hussain
Page 6
9
Syllabus
9691
Paper
33
[2]
(b) (i) -A class is the blueprint from which objects are defined // a class consists of the
properties and methods that define each object
-Plant/Tree/Bulb is a class
[2]
(ii) -One class can use the properties and methods from a parent/base/super class
-Tree/Bulb inherits the properties and methods of Plant
[2]
(iii) -An object can only read/write a property value using methods of the class // Class
contains both properties and the methods to use it
-e.g. The CountryOfOrigin property can only be output using the getCountryOfOrigin
method in the class Tree
[2]
10 (a) (i) Must begin with at least one <letter>
(ii) X is not defined as a <letter>
(iii) A maximum of 2 digits is allowed at the end
[3]
(b)
identity-code
letter
non-zero-digit
digit
Mark Points:
-Only one entry and one exit point used
-Order correct (letter, non-zero-digit, digit)
-Loop around letter
-alternative path to omit number
-alternative path to omit 2nd digit
(1 per -, max 4)
[4]
M.Mushtaq Hussain
*6373916302*
9691/32
COMPUTING
May/June 2012
Paper 3
2 hours
Candidates answer on the Question Paper.
No additional materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names for software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
[Turn over
Contact the Teacher: 03215275281
M.Mushtaq Hussain
2
1
A database is designed to store data about students at a college and the subjects that they
study.
The following table StudentSubjects was a first attempt at the database design.
Table: StudentSubjects
StudentName
Tom
TutorGroup
6
Tutor
SAN
Joe
MEB
Samir
SAN
Subject
Physics
Chemistry
Gen. Studies
Geography
French
Computing
Chemistry
Maths
Gen. Studies
Level SubjectTeacher
A
SAN
A
MEB
AS
DIL
AS
ROG
AS
HEN
A
VAR
A
MEB
A
COR
A
DIL
(a) (i) Explain why the table is not in First Normal Form (1NF).
[1]
(ii) Explain your answer by referring to the above data.
[1]
UCLES 2012
9691/32/M/J/12
For
Examiner's
Use
M.Mushtaq Hussain
3
Using the data given in the original table, show how this data is now stored in the
revised table designs.
For
Examiner's
Use
Table: Student
StudentName
TutorGroup
Tutor
Table: StudentSubjectChoices
StudentName
Subject
Level
SubjectTeacher
[3]
[2]
(ii) A student is not allowed to choose the same subject at A Level and AS.
What is the primary key of table StudentSubjectChoices?
[1]
UCLES 2012
9691/32/M/J/12
[Turn over
M.Mushtaq Hussain
4
(iii) There is a relationship between tables Student and StudentSubjectChoices.
Explain how the relationship is established using a primary key and foreign key.
[2]
[2]
[2]
UCLES 2012
9691/32/M/J/12
For
Examiner's
Use
M.Mushtaq Hussain
5
2
A binary pattern can be used to represent different data used in a computer system.
For
Examiner's
Use
[1]
[1]
[1]
UCLES 2012
9691/32/M/J/12
[Turn over
M.Mushtaq Hussain
6
(d) Floating point is to be used to represent real numbers with:
For
Examiner's
Use
[3]
(ii) The representation shown in part (d)(i) is normalised.
Explain why floating point numbers are normalised.
[1]
(iii) Show the binary pattern for the smallest positive number which can be stored
using a normalised 12-bit floating point representation.
Mantissa:
Exponent:
Denary:
UCLES 2012
[3]
9691/32/M/J/12
M.Mushtaq Hussain
7
(e) The developer of a new programming language decides that all real numbers will be
stored using 20-bit normalised floating point representation. She cannot decide how
many bits to use for the mantissa and how many for the exponent.
For
Examiner's
Use
Explain the trade-off between using either a large number of bits for the mantissa, or a
large number of bits for the exponent.
[2]
UCLES 2012
9691/32/M/J/12
[Turn over
M.Mushtaq Hussain
8
3
Data Type
Customer
ARRAY[2000] OF STRING
Index
INTEGER
Description
The customer names
Index position in the customer array
IsFound
SearchName
STRING
Index 1
REPEAT
IF Customer [
] = SearchName
THEN
IsFound TRUE
OUTPUT FOUND at position Index in the array
ELSE
Index
ENDIF
UNTIL (IsFound = TRUE) OR
IF
THEN
OUTPUT Customer name was NOT FOUND
[7]
ENDIF
(b) Comment on the efficiency of the serial search algorithm in part (a) for retrieving a data
item from an array with 2000 items.
[2]
UCLES 2012
9691/32/M/J/12
For
Examiner's
Use
M.Mushtaq Hussain
9
(c) A binary search may be an alternative algorithm to a serial search.
For
Examiner's
Use
(i) Describe how this algorithm works. (Do not attempt to write the pseudocode.)
[4]
(ii) A binary search is made to locate Cherry.
1
2
3
4
5
6
7
Apple
Banana
Cherry
Kiwi
Lemon
Mango
Plum
[3]
UCLES 2012
9691/32/M/J/12
[Turn over
M.Mushtaq Hussain
12
5
The table shows the assembly language instructions for a processor which has one general
purpose register the Accumulator.
Instruction
Op Code
Explanation
Operand
LDD
<address>
STO
<address>
LDI
<address>
LDX
<address>
INC
END
Accumulator
100
101
102
103
104
105
106
107
Main memory
0100 0000
0110 1000
1111 1110
1111 1010
0101 1101
0001 0001
1010 1000
1100 0001
200
1001 1111
[2]
Accumulator
Index Register
0000 0011
100
101
102
103
104
105
106
107
Main memory
0100 0000
0110 1000
1111 1110
1111 1010
0101 1101
0001 0001
1010 1000
1100 0001
200
1001 1111
[4]
UCLES 2012
9691/32/M/J/12
For
Examiner's
Use
M.Mushtaq Hussain
13
(c) Trace this assembly language program using the trace table below.
500
501
502
503
504
505
506
507
508
509
510
Accumulator
LDD
INC
STO
LDD
INC
STO
END
22
170
0
0
For
Examiner's
Use
507
509
508
510
507
22
Memory Address
508
509
170
510
0
[5]
(d) Explain the relationship between assembly language instructions and machine code
instructions.
[1]
UCLES 2012
9691/32/M/J/12
[Turn over
M.Mushtaq Hussain
14
6
For
Examiner's
Use
[2]
[6]
(ii) How will the operating system keep details about the state of all processes?
[1]
UCLES 2012
9691/32/M/J/12
M.Mushtaq Hussain
Page 2
1
Syllabus
9691
Paper
32
(a) (i) The table/each student has a repeated group of attributes // each student has a number
of subjects
[1]
(ii) StudentName, TutorGroup and Tutor would need to be repeated for each record
(b)
Table: Student
StudentName TutorGroup
Tom
Joe
Samir
6
7
6
Tutor
SAN
MEB
SAN
Table: StudentSubjectChoices
Student
Subject
Name
Tom
Physics
Tom
Chemistry
Tom
Gen Studies
Joe
Geography
Joe
French
Samir
Computing
Samir
Chemistry
Samir
Maths
Samir
Gen. Studies
Level
A
A
AS
AS
AS
A
A
A
A
[1]
Subject
Teacher
SAN
MEB
DIL
ROG
HEN
VAR
MEB
COR
DIL
[1]
[1]
[1]
[1]
[MAX 2]
(e) - There are dependent non-key attributes // there are non-key dependencies
- TutorGroup is dependant on Tutor // Tutor is dependent on TutorGroup
[2]
[Total: 14]
(a) 83
[1]
(b) 153
[1]
University of Cambridge International Examinations 2012
Contact the Teacher: 03215275281
M.Mushtaq Hussain
Page 3
Syllabus
9691
Paper
32
(c) 110
[1]
[3]
[3]
[Max 2]
[Total: 12]
(a) Boolean
Flags whether or not the requested customer name is found
[1]
[1]
SearchName
Index
Index + 1
Index = 2001 // Index >= 2001 // Index > 2000
IsFound = FALSE // NOT IsFound // Index = 2001 // Index > 2000
[1]
[1]
[1]
[1]
[1]
[MAX 4]
[3]
[Total: 16]
M.Mushtaq Hussain
Page 4
4
Syllabus
9691
Paper
32
(a) 21
[1]
(b) (i) a 5 b c + /
[1]
(ii) 2 3 * 6 2 / +
[2]
[1]
(d) (i) Last item added to the stack will be the first item to leave
[1]
[2]
(iii)
5
4
3
2
6
21
or 21
27
27
[4]
[Total: 12]
5
(a)
LDD 105
Accumulator
0001 0001
100
101
102
103
104
105
106
107
Main memory
0100 0000
0110 1011
1111 1110
1111 1010
0101 1101
0001 0001
1010 1000
1100 0001
[2]
M.Mushtaq Hussain
Page 5
Syllabus
9691
Paper
32
(b)
LDX 101
100
101
102
103
104
105
106
107
Accumulator
0101 1101
Index Register
00000011
Main memory
0100 0000
0110 1011
1111 1110
1111 1010
0101 1101
0001 0001
1010 1000
1100 0001
[MAX 4]
(c)
Accumulator
507
508
22
170
Memory Address
509
0
510
0
22
23
23
170
171
171
Mark as follows ...
- 22 to Accumulator
- Incremented to 23
- 23 copied to address 509
- 170 copied to Accumulator and incremented to 171
- 171 in address 510
[5]
(d) Every assembly language instruction is translated into exactly one machine code instruction /
there is a 1-to-1 relationship between them
[1]
[Total: 11]
M.Mushtaq Hussain
Page 6
6
Syllabus
9691
Paper
32
[2]
[1]
[2]
M.Mushtaq Hussain
Page 7
Syllabus
9691
Paper
32
[MAX 3]
[2]
[Total: 9]
M.Mushtaq Hussain
*3270941184*
9691/32
COMPUTING
May/June 2013
Paper 3
2 hours
Candidates answer on the Question Paper.
No additional materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names for software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
[Turn over
Contact the Teacher: 03215275281
M.Mushtaq Hussain
2
1
A hospital has a number of doctors and a number of wards. A ward has a number of
patients. A patient may be treated by more than one doctor and a doctor treats many
patients.
Data is to be recorded in a relational database and the tables include DOCTOR and
PATIENT.
(a) (i) What is the relationship between DOCTOR and PATIENT?
[1]
(ii) Show this relationship with an entity-relationship (E-R) diagram.
[1]
(iii) Draw an E-R diagram showing a database design which can be produced so that
the doctor and patient data are fully normalised.
[4]
[1]
UCLES 2013
9691/32/M/J/13
For
Examiner's
Use
M.Mushtaq Hussain
3
(c) Two of the incomplete table designs are:
PATIENT(PatientID, PatientName, Address, NextOfKin)
WARD(WardName, NurseInCharge, NumberOfBeds,
NumberOfOccupiedBeds, Specialism)
For
Examiner's
Use
[2]
[2]
UCLES 2013
9691/32/M/J/13
[Turn over
M.Mushtaq Hussain
6
3
The table shows the assembly language instructions for a processor which has one general
purpose register the Accumulator (ACC), and an index register (IX).
Instruction
Op Code
LDD <address>
STO <address>
LDI <address>
LDX <address>
INC <register>
ADD <address>
OUT
IN
END
UCLES 2013
Explanation
Operand
9691/32/M/J/13
For
Examiner's
Use
M.Mushtaq Hussain
7
The diagram shows a program loaded in main memory starting at location 100.
For
Examiner's
Use
(a) The instruction at address 100 is fetched. Shown are the contents of the registers after
execution.
100
101
102
103
104
105
106
107
ACC
88
IX
2
200
201
202
203
204
205
LD
INC
INC
LD
INC
LDI
INC
END
202
ACC
ACC
203
ACC
203
ACC
38
205
88
200
48
126
Which mode of addressing was used by this load instruction at address 100?
[1]
(b) The instruction at address 103 is fetched. Shown are the contents of the registers after
execution.
ACC
126
IX
2
Which mode of addressing was used by this load instruction at address 103?
[1]
UCLES 2013
9691/32/M/J/13
[Turn over
M.Mushtaq Hussain
8
(c) The instruction at address 105 is fetched and executed.
Draw on the diagram to explain how this instruction is executed and show the contents
of ACC after execution.
100
101
102
103
104
105
106
107
ACC
IX
200
201
202
203
204
205
LD
INC
INC
LD
INC
LDI
INC
END
202
ACC
ACC
203
ACC
203
ACC
38
205
88
200
48
126
[2]
UCLES 2013
9691/32/M/J/13
For
Examiner's
Use
M.Mushtaq Hussain
9
(d) Trace this assembly language program using the trace table below.
The user inputs 19 followed by 37.
100
101
102
103
104
105
106
107
108
ACC
IN
INC
STO
IN
INC
ADD
STO
OUT
END
For
Examiner's
Use
ACC
109
ACC
109
110
Memory location
109
110
Output
[5]
(e) In (d) the program was shown in assembly language. In practice this must be machine
code in order to execute the program.
Explain how the assembler software translates a program from assembly language into
machine code.
[3]
UCLES 2013
9691/32/M/J/13
[Turn over
M.Mushtaq Hussain
15
(b) The final stage of compilation is code optimisation.
For
Examiner's
Use
[2]
(ii) Give one practical example of code which would benefit from optimising.
[1]
A multiprogramming, multi-user operating system organises the available memory into two
fixed sized partitions.
A program, once loaded, occupies the same memory locations until its execution is
complete.
(a) Explain what is meant by:
(i) Batch processing
[3]
(ii) Interactive processing
[1]
UCLES 2013
9691/32/M/J/13
[Turn over
M.Mushtaq Hussain
16
(b) The diagram shows the current contents of main memory with a list of programs
waiting to be scheduled.
OTHER
10 Gb
PROG6
20 Gb
Partition 1
30 Gb
PROG7
40 Gb
50 Gb
PROG8
60 Gb
Partition 2
PROG9
70 Gb
80 Gb
Currently waiting to be loaded are:
(i) If PROG6 completes execution, which programs (if any) can be loaded next?
[1]
(ii) If PROG8 completes execution, which programs (if any) can be loaded next?
[1]
(iii) Describe two variations on this use of partitions which may make more efficient
use of memory.
1
2
[2]
UCLES 2013
9691/32/M/J/13
For
Examiner's
Use
M.Mushtaq Hussain
17
(c) 10 Gb of the main memory is labelled OTHER and will not be used for the execution of
application programs.
For
Examiner's
Use
Name two possible items of software this memory will be used for.
1
2
[2]
(d) Any program loaded is always in one of three possible states. One is the running state
meaning the job currently has use of the processor.
Name and describe the two other states.
1
2
[4]
UCLES 2013
9691/32/M/J/13
[Turn over
M.Mushtaq Hussain
18
7
For
Examiner's
Use
Identifier
City1
City2
<Space>
City3
10
UCLES 2013
9691/32/M/J/13
M.Mushtaq Hussain
19
(b) A programmer writes pseudocode to report whether or not a string value ThisValue is
found in the string array ThisArray. This is designed as a function StringFound
which returns a Boolean value.
For
Examiner's
Use
[3]
(ii) Use the following numbers to label your function header above.
1.
2.
Function parameter(s)
Where the return data type is stated
[2]
(iii) Write a single statement which calls the function StringFound to search for the
value LISBON in the array CapitalCities (upper bound 300). The function
returns the value to variable CityWasFound in the calling statement.
[2]
UCLES 2013
9691/32/M/J/13
[Turn over
M.Mushtaq Hussain
Page 2
1
Mark Scheme
GCE A LEVEL May/June 2013
Syllabus
9691
Paper
32
[1]
[1]
(iii)
[1]
2 one-to-many relationships
[1]
[1]
[1]
[1]
[1]
(c) The primary key of table WARD - WardName
[1]
[1]
[1]
[1]
[Total: 12]
M.Mushtaq Hussain
Page 4
3
Mark Scheme
GCE A LEVEL May/June 2013
Syllabus
9691
Paper
32
[1]
[1]
[1]
Accumulator contains 38
[1]
(d)
Memory location
ACC
19
20
109
(must be the first
column entry)
110
Output
20
37
38
58
58 /ft
58 /ft
1 mark for each of the emboldened numbers in the correct column and sequence
(e) Labels added to a (symbol) table // creates a list of addresses
[MAX 5]
[1]
Labels are later looked up to determine the actual address / Assembler must allocate
addresses to labels
[1]
Mnemonic looked up to give binary code/machine code
[1]
[1]
[1]
[MAX 3]
[Total: 12]
M.Mushtaq Hussain
Page 7
5
Mark Scheme
GCE A LEVEL May/June 2013
Syllabus
9691
Paper
32
[1]
[1]
[1]
[1]
[Mark as: 1 + 1]
[MAX 2]
[1]
[1]
[1]
[1]
[MAX 2]
[1]
[1]
[MAX 1]
[1]
[1]
M.Mushtaq Hussain
Page 8
6
Mark Scheme
GCE A LEVEL May/June 2013
Syllabus
9691
Paper
32
[1]
[1]
[1]
[1]
[1]
[MAX 3]
[1]
(i) PROG23
[1]
[1]
[1]
Move all jobs still loaded in the partition so that when a job completes there is only ever
one hole remaining
[1]
(c)
[1]
[1]
[MAX 2]
[1]
device drivers
[1]
[1]
[MAX 2]
[1]
the program is capable of being run and is awaiting its turn for the use of the processor
R. explanation of (only) ready to use the processor
[1]
Suspended // Blocked
[1]
the program is unable use the processor/ or by example, the job is currently using an I/O
device
Note: the explanation marks are not dependant on the correct name
[1]
[Total: 14]
M.Mushtaq Hussain
Page 9
7
Mark Scheme
GCE A LEVEL May/June 2013
Syllabus
9691
Paper
32
(a) (i) 2
[1]
[1]
(iii) 0
[1]
[1]
[1]
[1]
[1]
[1]
[1]
[1]
[1]
[Total: 11]
M.Mushtaq Hussain
Page 10
Mark Scheme
GCE A LEVEL May/June 2013
Syllabus
9691
Paper
32
Question 8
(a) (i) Example
[1]
[MAX 2]
[1]
[1]
Sensor
[1]
Capture data
[1]
Actuator // Motor
[1]
[1]
Microprocessor
[1]
[1]
Camera
[1]
To capture images
[1]
Memory
[1]
[1]
Speaker
[1]
[1]
[MAX 4]
(c) real-time
[1]
[Total: 8]
M.Mushtaq Hussain
*5582893707*
9691/33
COMPUTING
May/June 2013
Paper 3
2 hours
Candidates answer on the Question Paper.
No additional materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names for software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
[Turn over
Contact the Teacher: 03215275281
M.Mushtaq Hussain
2
1
A database is created to store data about all the football clubs who play in a number of
different leagues.
Each club runs a number of different teams (Men, Women, Boys, Girls).
Each club has a number of players.
A player can only be registered with one club.
Each club team plays in a league.
Data is to be recorded in a relational database and the tables include CLUB and LEAGUE.
(a) (i) What is the relationship between CLUB and LEAGUE?
[1]
(ii) Show this relationship with an entity-relationship (E-R) diagram.
[1]
(iii) Draw an E-R diagram showing a database design which can be produced so that
the club and league data are fully normalised.
[4]
UCLES 2013
9691/33/M/J/13
For
Examiner's
Use
M.Mushtaq Hussain
3
(b) (i) What is the relationship between CLUB and PLAYER?
[1]
For
Examiner's
Use
[1]
[2]
[2]
UCLES 2013
9691/33/M/J/13
[Turn over
M.Mushtaq Hussain
6
3
The table shows the assembly language instructions for a processor which has one general
purpose register the Accumulator (ACC), and an index register (IX).
Instruction
Op Code
Explanation
Operand
LDD <address>
STO <address>
LDI <address>
LDX <address>
LIX <address>
INC <register>
ADD <address>
OUT
IN
JMP <address>
END
The diagrams on the next page show a program loaded in main memory starting at address
100.
Two of the op-codes have been partially blanked out.
Locations 200 onwards contain data which is used by the program.
UCLES 2013
9691/33/M/J/13
For
Examiner's
Use
M.Mushtaq Hussain
7
(a) The instruction at address 100 is fetched and executed. Shown are the contents of the
registers after execution.
100
101
102
103
104
105
106
107
ACC
42
IX
3
LD
INC
INC
LD
INC
LDD
INC
END
For
Examiner's
Use
202
ACC
ACC
203
ACC
204
ACC
38
205
88
200
48
42
200
201
202
203
204
205
Which mode of addressing was used by this load instruction at address 100?
[1]
(b) The instruction at address 103 is fetched. Shown are the contents of the registers after
execution.
100
101
102
103
104
105
106
107
ACC
38
IX
3
200
201
202
203
204
205
LD
INC
INC
LD
INC
LDD
INC
END
202
ACC
ACC
203
ACC
204
ACC
38
205
88
200
48
42
Draw on the memory diagram to explain how this instruction works. Which mode of
addressing was used by this load instruction at address 103?
[2]
UCLES 2013
9691/33/M/J/13
[Turn over
M.Mushtaq Hussain
8
(c) Refer to the program used in (a) and (b). The instruction at address 105 is fetched and
executed.
Show the contents of ACC after execution.
ACC
IX
[1]
(d) Trace the first two iterations of this assembly language program using the trace table
below.
LIX
LDX
INC
OUT
INC
JMP
100
101
102
103
104
105
120
200
201
202
ACC
120
200
ACC
IX
101
165
93
107
IX
Output
[4]
UCLES 2013
9691/33/M/J/13
For
Examiner's
Use
M.Mushtaq Hussain
9
(e) In (d) the program was shown in assembly language. In practice this must be machine
code in order to execute the program.
For
Examiner's
Use
Explain how the assembler software translates a program from assembly language into
machine code.
[3]
UCLES 2013
9691/33/M/J/13
[Turn over
M.Mushtaq Hussain
14
5
(a) Describe four differences between using a compiler or interpreter for the translation
process and the execution of a high-level language source code program.
1
4
[4]
(b) The following are the first few lines of a source code program written using high-level
language XYZ which is about to be translated by the language compiler.
UCLES 2013
9691/33/M/J/13
For
Examiner's
Use
M.Mushtaq Hussain
15
During the lexical analysis stage the compiler will use a keyword table and a symbol
table.
For
Examiner's
Use
Symbol table
[3]
(ii) Explain how the table contents are used to translate the source code.
[2]
UCLES 2013
9691/33/M/J/13
[Turn over
M.Mushtaq Hussain
19
7
For
Examiner's
Use
Identifier
10
List1
17
23
11
16
List2
13
16
16
20
22
20
19
11
23
List3
41
29
34
39
39
44
UCLES 2013
9691/33/M/J/13
[Turn over
M.Mushtaq Hussain
20
(b) A programmer writes pseudocode to calculate an employees net pay with a function
CalcNetPay.
For
Examiner's
Use
[3]
[2]
[4]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
UCLES 2013
9691/33/M/J/13
M.Mushtaq Hussain
9691 COMPUTING
9691/33
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2013 series for most IGCSE, GCE
Advanced Level and Advanced Subsidiary Level components and some Ordinary Level components.
M.Mushtaq Hussain
Page 2
1
Mark Scheme
GCE A LEVEL May/June 2013
Syllabus
9691
Paper
33
[1]
[1]
(iii)
[1]
[1]
[1]
[1]
[1]
[1]
[1]
[1]
[1]
[1]
[Total: 12]
2
[1]
[1]
(iii)
Cambridge International Examinations 2013
Contact the Teacher: 03215275281
M.Mushtaq Hussain
Page 4
3
Mark Scheme
GCE A LEVEL May/June 2013
Syllabus
9691
Paper
33
[1]
[2]
(c) 48
[1]
(d)
ACC
IX
0
Output
165
166
166
1
93
94
94
(2)
Mark as follows:
Index register contain 0
Sequence of first box (or subsequent sequence for the same instructions)
Index register contains 1
Sequence for final box
[1]
[1]
[1]
[1]
M.Mushtaq Hussain
Page 6
Mark Scheme
GCE A LEVEL May/June 2013
Syllabus
9691
Paper
33
[1]
(ii)
ListTraversal(3)
MyList[3].Pointer <> 0 is TRUE
ListTraversal(1)
MyList[1].Pointer <> 0 is TRUE
ListTraversal(2)
MyList[2].Pointer <> 0 is TRUE
ListTraversal(4)
MyList[4].Pointer <> 0 is FALSE
OUTPUT MyList[4].Data // OUTPUT PEPPER
ENDPROCEDURE
OUTPUT COURGETTE
ENDPROCEDURE
OUTPUT BEAN
ENDPROCEDURE
OUTPUT APPLE
ENDPROCEDURE
[4]
(iii) The procedure has to backtrack/unwind from the current call
To return to the calling procedure // return to the addresses from which called
[1]
[1]
MAX 1
[Total: 15]
(a)
Interpreter translates one instruction, runs it before going on to the next // Compiler
translates all the instructions before run
[1]
Compiler creates object code/executable file // Interpreter does not
[1]
Interpreter makes for easier debugging //compiler errors produced away from the
execution
[1]
Compiled programs will execute faster // interpreted code will execute slower
[1]
Interpreter must be present to run the program // compiler software not needed at
runtime
[1]
Interpreter will translate code in loops more than once // Compiler only once
[1]
Once compiled no further translation needed // Interpreter needed every program
execution attempted
[1]
MAX 4
M.Mushtaq Hussain
Page 7
Mark Scheme
GCE A LEVEL May/June 2013
Syllabus
9691
Paper
33
[1]
[1]
[1]
[1]
MAX 2
[1]
[1]
[1]
[1]
MAX 2
[Total: 9]
(a) Batch is X
[1]
[1]
[1]
MAX 1
[1]
[1]
[1]
[1]
[1]
[1]
MAX 2
(iv) Running
The job currently has use of the processor
[1]
[1]
Suspended/Blocked
[1]
the program is unable use the processor/ or by example, the job is currently using an I/O
device
[1]
Note: the explanation marks are not dependant on the correct name
M.Mushtaq Hussain
Page 8
Mark Scheme
GCE A LEVEL May/June 2013
Syllabus
9691
Paper
33
(c) (i) The program is divided into fixed sized units called pages
The memory is divided into areas (with the same size) called page frames
Page management is done using a page frame table
Pages will be swapped in and out of page frames as required.
An area on the hard disc can act as virtual memory (to speed up the swapping)
Virtual memory extends memory capacity / acts as pseudo-memory
[1]
[1]
[1]
[1]
MAX 2
[1]
[1]
[1]
MAX 1
[Total: 16]
[1]
(ii) False / No
[1]
[1]
[1]
(b)
FUNCTION CalcNetPay (EmpGrade:CHAR/STRING, HoursWorked:SINGLE/INTEGER)
RETURN SINGLE
[1]
[1]
[1]
A: RETURN REAL/CURRENCY
[Total: 7]
8
[1]
[1]
[1]
[1]
Weather forecasting has many changes which are based on mathematical equations
Inputs will originate from various sensors
e.g. wind speed / temperature / air pressure
powerful computers process results (from many sensor sources)
Can use parallel processing
Outputs will be produced which are based on all the available data
[1]
[1]
[1]
[1]
[1]
[1]
MAX 4
[Total: 6]
Cambridge International Examinations 2013
Contact the Teacher: 03215275281
M.Mushtaq Hussain
*9693515187*
9691/31
COMPUTING
Paper 3
October/November 2013
2 hours
[Turn over
Contact the Teacher: 03215275281
M.Mushtaq Hussain
4
2
A runner must be registered with one club only and club names are unique.
A club has runners; each runner has a unique national MemberID.
Each race is organised by a club and the Club Secretary records which runners are
entered for each race.
Runners may enter any race.
There is only one race on any one day.
At present each club records the data for the competition races it organises. The data is
stored in flat files.
(a) Describe three advantages that a relational database would have over the use of flat
files.
1
3
[3]
(b) (i) What is the relationship between runner and race?
[1]
(ii) What is the relationship between club and race?
[1]
(c) A database solution is to be developed.
Two of the tables are RUNNER and RACE.
(i) Draw an entity-relationship (E-R) diagram showing a database design which can
be produced so that the runner and race data are fully normalised.
[2]
UCLES 2013
9691/31/O/N/13
For
Examiner's
Use
M.Mushtaq Hussain
5
(ii) Explain how the relationships are implemented.
For
Examiner's
Use
[2]
(d) The following table design is suggested for RUNNER.
RUNNER(MemberID, RunnerName, RunnerDOB, ClubName, ClubAddress)
This is poorly designed.
(i) Is this table in First Normal Form (1NF)?
Explain.
[1]
(ii) Is this table in Second Normal form (2NF)?
Explain.
[1]
(iii) The table is not in Third Normal Form (3NF).
Explain.
[1]
(iv) Using only the attributes given in the RUNNER table above, produce a new design
which is fully normalised.
The table descriptions should be expressed as:
TableName(Attribute1, Attribute2, Attribute3, ...)
[2]
UCLES 2013
9691/31/O/N/13
[Turn over
Contact the Teacher: 03215275281
M.Mushtaq Hussain
6
(e) Explain why all tables in the final design should be fully normalised.
For
Examiner's
Use
[2]
(f) The table to store the race data has the following design:
RACE(RaceDate, RaceStartTime, StartVenue, Distance,
OrganisingClubName)
Write a Data Manipulation Language (DML) query to report all races after the 1st
January 2013 which are less than 10 km. Display the race date and organising club
name only.
Use the keywords SELECT, FROM, WHERE.
[3]
(a) Most modern computers are designed using Von Neumann architecture.
Explain what is meant by Von Neumann architecture.
[2]
(b) (i) Convert the hexadecimal number 7A to denary.
[1]
(ii) Convert the binary number 0101 1100 to hexadecimal.
[1]
UCLES 2013
9691/31/O/N/13
M.Mushtaq Hussain
7
(iii) Why do computer scientists often write binary numbers in hexadecimal?
For
Examiner's
Use
[1]
(c) The diagram shows a program loaded into main memory starting at memory address
7A Hex.
Address
Main memory
(contents shown in
Hex.)
7A
7B
7C
7D
2150
A351
A552
FFFF
90
003C
(i) How many bits are used for each main memory location?
[1]
The trace table below is used to show how the contents of the special-purpose
registers change as the program is executed.
The steps in the fetch stage of the fetch-execute cycle are shown in the first column
using register transfer notation. (For example, MAR [PC] means the content of the
Program Counter is copied to the Memory Address Register.)
(ii) Complete the trace table for the fetching of the first program instruction (2150):
MAR
MDR
CIR
Buses
Address bus
Data bus
7A
MAR [PC]
PC [PC] + 1
MDR [[MAR]]
CIR [MDR]
[5]
UCLES 2013
9691/31/O/N/13
[Turn over
Contact the Teacher: 03215275281
M.Mushtaq Hussain
8
(d) The following table shows some of a processors instruction set in assembly language.
Instruction
Op Code
Explanation
Operand
LDD <address>
LDI <address>
LIX <address>
LDX <address>
Main memory
LIX 200
LDD 201
LDI 201
LDX 201
200
201
202
203
204
3
216
99
217
63
216
217
96
97
Complete the trace table below for the first four program instructions.
Show each change in the contents of the registers.
Instruction
Register
Accumulator (ACC)
Index Register (IX)
LIX 200
LDD 201
LDI 201
LDX 201
[4]
UCLES 2013
9691/31/O/N/13
For
Examiner's
Use
M.Mushtaq Hussain
15
(b) (i) The processor receives an interrupt. This triggers the following sequence of steps.
1.
2.
Also save
3.
4.
5.
Restore the
6.
For
Examiner's
Use
[4]
[3]
Application 2
Reason
[4]
UCLES 2013
9691/31/O/N/13
[Turn over
Contact the Teacher: 03215275281
M.Mushtaq Hussain
16
(b) Explain the terms encryption algorithm and encryption key.
For
Examiner's
Use
Encryption algorithm
Encryption key
[2]
(c) Asymmetric encryption uses both a public key and a private key.
Explain how they work together to encrypt and decrypt a message.
[3]
(d) Authorisation and authentication are processes designed to protect the computer
system and data.
Give one technique used for each.
Authorisation
Authentication
[2]
Permission to reproduce items where third party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
UCLES 2013
9691/31/O/N/13
M.Mushtaq Hussain
*2685241834*
9691/32
COMPUTING
October/November 2013
Paper 3
2 hours
Candidates answer on the Question Paper.
No additional materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names for software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
[Turn over
Contact the Teacher: 03215275281
M.Mushtaq Hussain
4
2
For
Examiner's
Use
At present the company stores and manages all the data using flat files.
(a) Describe three advantages that a relational database would have over the use of flat
files.
1
3
[3]
[2]
UCLES 2013
9691/32/O/N/13
M.Mushtaq Hussain
5
(ii) Explain how the relationships are implemented.
For
Examiner's
Use
[2]
[1]
(ii) Is this table in Second Normal form (2NF)?
Explain.
[1]
(iii) The table is not in Third Normal Form (3NF).
Explain.
[1]
(iv) Using only the attributes given in the PRODUCT table above, produce a new design
which is fully normalised.
The table descriptions should be expressed as:
TableName(Attribute1, Attribute2, Attribute3, ...)
[2]
UCLES 2013
9691/32/O/N/13
[Turn over
M.Mushtaq Hussain
6
(e) Explain why all tables in the final design should be fully normalised.
For
Examiner's
Use
[2]
(f) The table to store the order data has the following design:
ORDER(OrderNo, OrderDate, OrderTime, IsPaid, OrderAmountPaid,
PaymentMethod, CustomerID)
Write a Data Manipulation Language (DML) query to report orders which were placed
on the 15 January 2013 and paid for using a debit card. Show the customer ID and
order number only.
Use the keywords SELECT, FROM, WHERE.
[3]
[2]
UCLES 2013
9691/32/O/N/13
M.Mushtaq Hussain
7
(iii) Why do computer scientists often write binary numbers in hexadecimal?
For
Examiner's
Use
[1]
(c) The diagram shows a program loaded into main memory starting at memory address
30 Hex.
Address
Main memory
(contents shown in
Hex.)
30
31
32
33
2150
A351
A552
FFFF
58
59
5A
003C
103C
010B
(i) How many bytes are used to store each program instruction?
[1]
(ii) Describe the steps in the fetch stage of the fetch-execute cycle.
Refer to the instruction at address 30 to illustrate your answer.
[5]
UCLES 2013
9691/32/O/N/13
[Turn over
M.Mushtaq Hussain
8
(d) The following table shows some of a processors instruction set in assembly language.
Instruction
Explanation
Op Code
Operand
LIX <address>
LDX <address>
STO <address>
ADD <address>
INC <register>
JMP <address>
Address
UCLES 2013
Main memory
contents
100
101
102
103
104
105
LIX 200
LDX 200
ADD 204
STO 204
INC IX
JMP 101
200
201
202
203
204
1
13
14
22
0
9691/32/O/N/13
For
Examiner's
Use
M.Mushtaq Hussain
9
Complete the trace table below for three iterations of the loop.
For
Examiner's
Use
Show each change to the contents of the registers and memory location 204.
ACC
IX
Main memory
address 204
0
[4]
[3]
UCLES 2013
9691/32/O/N/13
[Turn over
M.Mushtaq Hussain
16
6
[4]
(b) Real numbers are to be stored using floating point representation with:
[3]
(ii) Explain how you can recognise that the above number is normalised.
[1]
UCLES 2013
9691/32/O/N/13
For
Examiner's
Use
M.Mushtaq Hussain
18
7
For
Examiner's
Use
Application 2
Reason
[4]
Cipher text
[2]
[3]
UCLES 2013
9691/32/O/N/13
M.Mushtaq Hussain
19
(d) Authorisation and authentication are processes designed to protect the computer
system and data.
Give one technique used for each.
Authorisation
Authentication
[2]
UCLES 2013
9691/32/O/N/13
For
Examiner's
Use
M.Mushtaq Hussain
*9188780506*
9691/33
COMPUTING
October/November 2013
Paper 3
2 hours
Candidates answer on the Question Paper.
No additional materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names for software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
[Turn over
Contact the Teacher: 03215275281
M.Mushtaq Hussain
4
2
For
Examiner's
Use
At present the company records all car, customer and hire data in flat files.
(a) Describe three advantages that a relational database would have over the use of flat
files.
1
3
[3]
[2]
UCLES 2013
9691/33/O/N/13
M.Mushtaq Hussain
5
(ii) Explain how the relationships are implemented.
For
Examiner's
Use
[2]
[1]
(ii) Is this table in Second Normal form (2NF)?
Explain.
[1]
(iii) The table is not in Third Normal Form (3NF).
Explain.
[1]
(iv) Using only the attributes given in the CAR table above, produce a new design
which is fully normalised.
The table descriptions should be expressed as:
TableName(Attribute1, Attribute2, Attribute3, ...)
[2]
UCLES 2013
9691/33/O/N/13
[Turn over
M.Mushtaq Hussain
6
(e) Explain why all tables in the final design should be fully normalised.
For
Examiner's
Use
[2]
(f) The table to store the hire data has the following design:
HIRE(HireID, CarRegistrationNo, HireBookingDate, HireStartDate,
NoOfDays, HireRate, CustomerID)
Write a Data Manipulation Language (DML) query to report all hire bookings made for
car registration 456431 with customer C674. Display the customer ID and hire ID only.
Use the keywords SELECT, FROM, WHERE.
[3]
[2]
[1]
UCLES 2013
9691/33/O/N/13
M.Mushtaq Hussain
7
(c) The diagram shows a program loaded into main memory starting at memory address
40 Hex.
Address
For
Examiner's
Use
Main memory
(Contents shown in
Hex.)
40
41
42
43
7324
A351
A552
FFFF
68
69
6A
003C
103C
010B
(i) How many bytes are used to store each program instruction?
[1]
(ii) Describe the steps in the fetch stage of the fetch-execute cycle.
Use the instruction at address 40 to illustrate your answer.
[5]
UCLES 2013
9691/33/O/N/13
[Turn over
M.Mushtaq Hussain
8
(d) The following table shows some of a processors instruction set in assembly language.
Instruction
Explanation
Op Code
Operand
LDD <address>
LDI <address>
STO <address>
ADD <address>
INC <register>
JMP <address>
UCLES 2013
Main memory
LDI 160
ADD 153
STO 153
LDD 160
INC ACC
STO 160
JMP 130
150
151
152
153
13
23
11
0
160
150
9691/33/O/N/13
For
Examiner's
Use
M.Mushtaq Hussain
9
Complete the trace table below for two iterations of the loop.
Show each change in the contents of the register and memory locations.
Register
ACC
For
Examiner's
Use
Memory location
153
160
0
150
[4]
UCLES 2013
9691/33/O/N/13
[Turn over
M.Mushtaq Hussain
16
6
For
Examiner's
Use
[3]
[1]
(ii) An example of an interrupt generated by a hardware device is the process in which
a printer signals that it is out of paper.
Give two further examples of interrupts, one which is hardware generated, and
one which is generated by an executing program.
Hardware generated
Program generated
[2]
READY
SUSPENDED
[3]
UCLES 2013
9691/33/O/N/13
M.Mushtaq Hussain
17
7
(a) Below are some terms and definitions for devices used for networking.
(i) Match up each device on the left with its definition. Draw a line connecting each
description to the appropriate network device.
For
Examiner's
Use
Router
Bridge
Firewall
Switch
Modem
UCLES 2013
9691/33/O/N/13
[Turn over
M.Mushtaq Hussain
18
(b) (i) Networks use a variety of different media for communication.
For
Examiner's
Use
Medium 2
[4]
(ii) A new communication link is to be constructed in a network.
Name one factor that will be considered when deciding on the medium to be used.
[1]
UCLES 2013
9691/33/O/N/13
M.Mushtaq Hussain
Page 2
1
Mark Scheme
GCE A LEVEL October/November 2013
Syllabus
9691
Paper
31
(a) (i) a b + 7 /
[1]
(ii) 2 3 z * 5 + /
1
2nd mark for completely correct
[1]
[1]
[1]
[1]
(c) (i) In-order traversal // (Traverse each subtree in the order) left-root-right
[1]
(ii) E M c 2 ^ * =
[1]
[1]
[Total: 8]
[1]
[1]
[1]
[1]
(c) (i)
[1]
[1]
[1]
[1]
M.Mushtaq Hussain
Page 3
Mark Scheme
GCE A LEVEL October/November 2013
Syllabus
9691
Paper
31
(iii) There are dependent non-key attributes // ClubAddress is dependant on ClubName [1]
(iv) RUNNER(MemberID, RunnerName, RunnerDOB, ClubName)
[1]
[1]
CLUB(ClubName, ClubAddress)
If primary key not indicated penalise once only
(e) Avoids data duplication/repeated data
Avoids data inconsistencies
Ensures data integrity
[1]
[1]
[1]
[1]
[1]
[1]
[1]
[1]
[1]
[1]
MAX 2
[1]
(ii) 5C
[1]
(iii) Fewer digits used to represent any number // long string difficult to interpret
Less likely to make a mistake when copying/converting a digit string
Easy to convert from binary to hex (vice versa) than binary to denary
[1]
[1]
[1]
MAX 1
M.Mushtaq Hussain
Page 4
Mark Scheme
GCE A LEVEL October/November 2013
Syllabus
9691
Paper
31
[1]
(ii)
Fetch
stages
MAR
MDR
CIR
Busses
Address
bus
Data bus
7A
MAR [PC]
7A
PC [PC] + 1
7B
2150
MDR [[MAR]]
2150
CIR [MDR]
For the buses column penalise once for any additional incorrect ticks
MAX 5
(d)
Instruction
Register
Accumulator
Index Register
(ACC)
(IX)
LIX 200
LDD 201
216
LDI 201
96
LDX 201
63
1 per contents
[4]
[Total: 15]
[1]
[1]
[1]
[1]
[1]
MAX 3
M.Mushtaq Hussain
Page 5
Mark Scheme
GCE A LEVEL October/November 2013
Syllabus
9691
Paper
31
[1]
[1]
[1]
RESOURCE class
Title : STRING
OnLoan : BOOLEAN
[1]
BOOK class
Author : STRING
[1]
FILM class
RunningTime : INTEGER
[1]
MUSIC class
NoOfTracks : INTEGER
[1]
RECORDING class
ReleaseDate : DATE
[1]
MAX 8
(c)
Encapsulation
Combining together of an objects properties and the methods
Restricts the programmers access to the objects data // Hiding of data
Data values can only be read/written using the methods of the class
[1]
[1]
[1]
[Total: 13]
(a) Last item added is the first item to leave // or equivalent wording
R. LIFO
[1]
[1]
[1]
[1]
[1]
[1]
[1]
M.Mushtaq Hussain
Page 7
7
Mark Scheme
GCE A LEVEL October/November 2013
Syllabus
9691
Paper
31
[1]
[1]
Encryption of passwords
Designed to prevent unauthorised access
[1]
[1]
[1]
Encryption key
A number/parameter used by the encryption algorithm // e.g. the displacement shift for
transposing characters
[1]
(c) Asymmetric encryption ...
Private key is known only to the owner//Public key is known by both parties
Public and private keys are obtained from the purchase of a digital certificate //
Keys are generated at the start of a secure (e.g. web or email) session
EITHER
Sender will use their own private key
Receiver decrypts using the senders public key
OR .
Sender uses the recipients public key
Receiver decrypts using their own private key
[1]
[1]
[1]
[1]
[1]
[1]
MAX 3
[1]
[1]
MAX 1
[1]
[1]
[1]
MAX 1
[Total: 11]
M.Mushtaq Hussain
9691 COMPUTING
9691/32
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2013 series for most IGCSE,
GCE Advanced Level and Advanced Subsidiary Level components and some Ordinary Level
components.
M.Mushtaq Hussain
Page 3
Mark Scheme
GCE A LEVEL October/November 2013
Syllabus
9691
Paper
32
[1]
[1]
[1]
(iv) PRODUCT(ProductID,
ProductDescription,
RetailPrice,
SupplierID)
[1]
SUPPLIER(SupplierID, SupplierName, SupplierTelNumber)
[1]
[1]
[1]
[1]
MAX 2
[1]
[1]
[1]
[1]
[1]
[1]
MAX 2
(b) (i) 3C
[1]
(ii) 271
[1]
(iii) Fewer digits used to represent any number // long string difficult to interpret
Less likely to make a mistake when copying/converting a digit string
Easy to convert from binary to hex (vice versa) than binary to denary
[1]
[1]
[1]
MAX 1
M.Mushtaq Hussain
Page 4
Mark Scheme
GCE A LEVEL October/November 2013
Syllabus
9691
Paper
32
[1]
[1]
[1]
[1]
[1]
[1]
(d)
ACC
IX
1
[1]
[1]
[1]
[1]
[1]
MAX 5
Memory
Address
204
0
13
(13)
13 / ft
2
14
27
27
3
22
49
49
4
[4]
[Total: 15]
M.Mushtaq Hussain
Page 7
6
Mark Scheme
GCE A LEVEL October/November 2013
Syllabus
9691
Paper
32
(a)
126
5
1
1
0
0
1
1
0
1
1
0
1
1
0
1
1
0
0
1
1
1
1
0
0
1
1
[1]
5 binary
[1]
[1]
Answer is incorrect since outside range possible represented with single byte // answer
overflows// final bit pattern is NOT 131
[1]
(b) (i) Mantissa: +13/16
Exponent: +3
Number: +13/16 2+3 // evidence of shifting the mantissa three places
6.5
[1]
[1]
[1]
[1]
MAX 3
[1]
(iii) More bits used for the mantissa will result in greater accuracy/precision
More bits used for the exponent will result in larger range of numbers
[1]
[1]
[Total: 10]
M.Mushtaq Hussain
Page 8
7
Mark Scheme
GCE A LEVEL October/November 2013
Syllabus
9691
Paper
32
[1]
[1]
[1]
[1]
[1]
[1]
(d) Authorisation
Different permissions granted to different users
Restricted access to certain data files/directories/physical devices
User IDs
Authentication
Passwords
(Digital) signature // (Digital) certificate
Use of biometric data and methods
[1]
[1]
[1]
[1]
[1]
[1]
MAX 3
[1]
[1]
[1]
MAX 1
[1]
[1]
[1]
MAX 1
[Total: 11]
M.Mushtaq Hussain
9691 COMPUTING
9691/33
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2013 series for most IGCSE,
GCE Advanced Level and Advanced Subsidiary Level components and some Ordinary Level
components.
M.Mushtaq Hussain
Page 3
Mark Scheme
GCE A LEVEL October/November 2013
Syllabus
9691
Paper
33
[1]
[1]
[1]
[1]
[1]
[Total: 19]
[1]
[1]
[1]
(ii) 123
[1]
[1]
[1]
[1]
MAX 1
[1]
[1]
[1]
[1]
[1]
[1]
[1]
[1]
[1]
MAX 5
M.Mushtaq Hussain
Page 4
Mark Scheme
GCE A LEVEL October/November 2013
Syllabus
9691
Paper
33
(d)
Memory address
ACC
153
160
13
13
13
150
151
151
23
36
36
151
152
152
[4]
[Total: 15]
M.Mushtaq Hussain
Page 6
5
Mark Scheme
GCE A LEVEL October/November 2013
Syllabus
9691
Paper
33
(a) BOOLEAN
Flags when the book title is found
STRING (for SearchBook)
[1]
[1]
[1]
[1]
REPEAT
READ next book data value and assign to NextBook
IF NextBook = SearchBook
THEN
IsFound TRUE
OUTPUT FOUND
ENDIF
UNTIL (IsFound = TRUE) OR EOF
[1]
[1]
[1]
[1]
[1]
[1]
[1]
[1]
[1]
[1]
[1]
[1]
ENDFUNCTION
ENDFUNCTION
[Total: 16]
Cambridge International Examinations 2013
Contact the Teacher: 03215275281
M.Mushtaq Hussain
Page 7
6
Mark Scheme
GCE A LEVEL October/November 2013
Syllabus
9691
Paper
33
[1]
[1]
[1]
[1]
MAX 3
[1]
[1]
[1]
MAX 1
[1]
[1]
MAX 2
(c) RUNNING
The process currently has use of the processor
[1]
READY
The process would like to use the processor when the current process releases
the processor
[1]
SUSPENDED
The process cannot currently use the processor// or by example, the job is currently using an
I/O device
[1]
[Total: 9]
M.Mushtaq Hussain
Page 8
7
Mark Scheme
GCE A LEVEL October/November 2013
Syllabus
9691
Paper
33
(a) (i)
Firewall
Modem
Switch
Network
Interface
card
Router
Bridge
[1]
MAX 4
[1]
[1]
MAX 1
[Total: 11]
M.Mushtaq Hussain
*3948996442*
COMPUTING
9691/32
May/June 2014
Paper 3
2 hours
Candidates answer on the Question Paper.
No additional materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names for software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
[Turn over
Contact the Teacher: 03215275281
M.Mushtaq Hussain
3
2
A company hires vehicles to customers. A database is to be created to record data for all hire
transactions.
The company has a number of depots in different towns. Each town has one depot only. A
number of vehicles are available for hire. Each vehicle is based at one of the depots. Every
vehicle starts and ends a hire from its base depot.
Depot data consist of:
Depot town name
Depot address
Vehicle data consist of:
A unique registration number
A vehicle type code. Vehicles are coded as SC Small Car, LC Large Car or V Van.
Vehicle mileage
Customer data consist of:
Unique Customer ID
Customer address
Data for each hire transaction consist of:
Customer ID
Vehicle registration number
Date the booking was made
Start date of the hire
Return date
Driving licence check. A check is carried out to confirm that customers have a valid driving
licence and this is recorded. This check is done when the customer shows their driving
licence when they collect the vehicle.
Hire charge
(a) At first, the company used a single table named DepotVehicle. A sample of the tables
data is shown below.
DepotTown
RegistrationNo
VehicleType
0987
SC
0988
SC
0991
0945
1431
SC
1476
LC
Dhaka
Kumba
[2]
UCLES 2014
9691/32/M/J/14
[Turn over
M.Mushtaq Hussain
4
The final design uses these four entities:
Depot
Vehicle
Customer
Hire.
[1]
(ii) Complete the description for the Vehicle and Depot tables using the notation:
TableName(Attribute1, Attribute2, )
where the underlined attribute indicates the primary key.
Vehicle(
Depot(
[4]
(c) The Customer and Hire tables (with the primary keys not shown) are as follows:
Customer(CustomerID, CustomerAddress)
Hire(CustomerID, DateBooked, RegistrationNo,
StartDate, ReturnDate, LicenceChecked, HireCharge)
Consider the relationship between Customer and Hire.
(i) Draw the E-R diagram.
[1]
(ii) Explain how this relationship between Customer and Hire is modelled using the given
attributes.
[2]
UCLES 2014
9691/32/M/J/14
M.Mushtaq Hussain
5
(d) The following Data Manipulation Language (DML) query is run:
SELECT RegistrationNo
FROM Hire
WHERE (StartDate < Now() ) AND (ReturnDate > Now() );
Note: Now() is a function which returns the current date and time.
Describe what useful information is produced by the query.
[2]
(e) A query is needed to list the depot and registration number for all small car vehicles.
Write the query in Data Manipulation Language (DML).
[3]
(f) On 05/04/2014, customer 085 booked a vehicle hire. This hire will start on 13/04/2014.
When the customer arrives, the receptionist will check their driving licence. If the licence is
valid, the value of the licence check attribute, of the correct Hire record, must be updated.
Complete the Data Manipulation Language (DML) command to make the change.
UPDATE Hire
SET
WHERE CustomerID = '085' AND
UCLES 2014
9691/32/M/J/14
[2]
[Turn over
M.Mushtaq Hussain
11
5
Byte 2
0
Byte 1
Byte 2
[2]
(b) Two bytes together are used to represent a Binary Coded Decimal (BCD) number.
State the denary number represented by Byte 3 and Byte 4.
Byte 3
0
Byte 4
0
Denary:
[2]
(c) Byte 5 and Byte 6 together represent a 16-bit colour code used in a drawing program.
Byte 5
0
Byte 6
0
UCLES 2014
9691/32/M/J/14
[2]
[Turn over
M.Mushtaq Hussain
12
(d) Many computer systems need to store and process real numbers.
A computer uses two bytes to store a real number. The first (Byte 7) stores the mantissa and
the second (Byte 8), the exponent. Both mantissa and exponent use twos complement.
(i) What denary number is represented by Byte 7 and Byte 8?
Byte 7
0
Byte 8
0
[3]
(ii) Without any working out, how can you recognise that this 16-bit pattern (Byte 7 and Byte
8) is a positive number?
[1]
(e) (i) Without any working out, how can you recognise that this 16-bit pattern (Byte 7
and Byte 8) is normalised?
[1]
(ii) Both of the representations shown below are not normalised.
Write in the empty rows the binary for the normalised form for the same value.
Mantissa
0
Exponent
0
Mantissa
1
Exponent
0
[3]
UCLES 2014
9691/32/M/J/14
M.Mushtaq Hussain
13
(f) A change is made to use the two bytes as a 12-bit mantissa with a 4-bit exponent. Describe
the effect of this change on the values that can be represented, compared with the old use of
the two bytes.
[2]
UCLES 2014
9691/32/M/J/14
[Turn over
M.Mushtaq Hussain
14
6
A business has a customer services section. The business is considering a new Local Area
Network (LAN) for this section.
(a) Describe what is meant by a Local Area Network.
[2]
The following are some comments made by the Chief Executive to the IT Manager.
(b) I am concerned that only the staff in the Customer Services team should have access to the
LAN.
(i) State what authentication technique will be used for this.
[1]
(ii) Identify what hardware will be in place to restrict the access to the LAN.
[1]
(c) I understand if the network is to be a wired network, there is a choice about the type of
cabling used.
Name and describe two types of cabling. Suggest a benefit for each cable type. The
benefits should be different.
Cable type 1
Description
Benefit
Cable type 2
Description
Benefit
[6]
(d) Many customer enquiries will be dealt with over the World Wide Web; so each computer in
the LAN needs access to the Internet.
Name the additional hardware needed to provide access to the Internet.
[1]
UCLES 2014
9691/32/M/J/14
M.Mushtaq Hussain
15
(e) With the Internet connection, I am concerned that we will get unauthorised access to our
LAN.
Name the hardware and/or software needed to prevent unauthorised access.
[1]
(f) Customer Services staff must be able to get access to a centralised store of customer data.
Our business deals with thousands of customers. They produce millions of transactions.
Explain what hardware and software will be needed to enable this.
Hardware
Software
[3]
UCLES 2014
9691/32/M/J/14
[Turn over
M.Mushtaq Hussain
9691 COMPUTING
9691/32
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2014 series for most IGCSE, GCE
Advanced Level and Advanced Subsidiary Level components and some Ordinary Level components.
M.Mushtaq Hussain
Page 3
(a)
Mark Scheme
GCE A LEVEL May/June 2014
Syllabus
9691
Paper
32
(1)
(1)
[2]
(b) (i)
[1]
(ii)
(1)
[4]
(c) (i)
Makes
(ii)
(d)
(e)
(f)
[1]
(1)
(1)
[2]
(1)
(1)
[2]
(1)
(1)
(1)
[3]
UPDATE Hire
SET LicenceChecked = TRUE // YES // equivalent
(1)
(1)
[2]
M.Mushtaq Hussain
Page 7
(a)
Mark Scheme
GCE A LEVEL May/June 2014
Syllabus
9691
97
116
(b)
(c)
(d) (i)
(ii)
(e) (i)
(1)
(1)
[2]
61 97
1 mark per byte
[2]
6A F5
1 mark per byte
[2]
[3]
[1]
(Normalised ) The mantissa/byte 7 starts with 01 / the first two bits are
different
[1]
(ii)
(f)
Paper
32
Mantissa
0
0
0
Mantissa
0
1
1
Exponent
0
0
1
0
Exponent
1
0
0
[MAX 3]
[2]
M.Mushtaq Hussain
Page 8
(a)
Syllabus
9691
(b) (i)
(ii)
(c)
Mark Scheme
GCE A LEVEL May/June 2014
Paper
32
(1)
(1)
[2]
[1]
[1]
Possible benefits
Optic fibre:
data travels at the speed of light / provides for faster data transfer
not affected by moisture / (electro-magnetic) interference
impossible for the data to be hacked
high bandwidth possible
Twisted pair:
less chance of interference from magnetic forces in close proximity
low cost
easy to work with // flexible
Coaxial:
difficult for the data to be hacked into
screened to avoid (electro-magnetic) interference
Mark as: 2 3 marks per type
[6]
(d)
Router
[1]
(e)
[1]
(f)
Hardware
Large amount of hard-disk storage
Database server
Software
Database Management Software (A. DBMS)
R. database
Computers must have some form of client software to access the database //
Software must be specially written to access the DBMS // A. browser if
followed by some form of explanation
[Max 3]
M.Mushtaq Hussain
*6504753376*
COMPUTING
9691/33
May/June 2014
Paper 3
2 hours
Candidates answer on the Question Paper.
No additional materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names for software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
[Turn over
Contact the Teacher: 03215275281
M.Mushtaq Hussain
3
2
Paintings by various artists are on display in art galleries all over the world. When a gallery holds
an exhibition, it may display paintings:
A database is to be created. It will store data about artists, paintings, galleries and exhibitions.
Artist data consist of:
artist name (unique).
Painting data consist of:
When a gallery lends a painting to another gallery, it may charge a loan fee.
UCLES 2014
9691/33/M/J/14
[Turn over
M.Mushtaq Hussain
4
The database design consists of five entities. These are shown in the entity-relationship
(E-R) diagram.
Gallery
Exhibition
Features
ExhibitionPainting
Owns
Painting
Artist
Paints
[1]
(ii) Complete the description for the Gallery and Exhibition tables. Use the notation:
TableName(Attribute1, Attribute2, ...)
where the underlined attribute indicates the primary key.
Gallery (
Exhibition (
)[4]
(b) The Painting and ExhibitionPainting entities (with the primary keys not shown) are
as follows:
Painting(PaintingRefNo, PaintingTitle, ArtistName, PaintingDate,
GalleryName)
ExhibitionPainting(ExhibitionTitle, PaintingRefNo, LoanFee)
(i) What is the primary key of table ExhibitionPainting?
[1]
Consider the relationship between Painting and ExhibitionPainting.
(ii) Draw this relationship on the E-R diagram.
[1]
(iii) Explain how this relationship is modelled using the given attributes.
[2]
UCLES 2014
9691/33/M/J/14
M.Mushtaq Hussain
5
(c) Additional data are to be stored about each artist as follows:
Artist(ArtistName, Nationality, YearBorn, YearDied)
The following Data Manipulation Language (DML) query is run.
SELECT PaintingRefNo
FROM Painting, Artist
WHERE (Artist.ArtistName = Painting.ArtistName) AND
(YearBorn >= 1900) AND (YearDied <= 2000);
Identify what useful information is produced by the query.
[2]
(d) Write a DML query to display the painting reference number and painting title for all paintings
by Da Vinci.
[3]
(e) The painting The Guitar Player was in the Secrets and Silence exhibition. The
ExhibitionPainting table has a record for this. In the record:
UCLES 2014
9691/33/M/J/14
);
[3]
[Turn over
M.Mushtaq Hussain
13
5
Byte 2
0
Byte 1
Byte 2
[2]
(b) Two bytes together are used to represent a Binary Coded Decimal (BCD) number.
State the denary number represented by Byte 3 and Byte 4.
Byte 3
0
Byte 4
0
Denary
[2]
(c) Byte 5 and Byte 6 together represent a 16-bit colour code used in a drawing program.
Byte 5
0
Byte 6
1
UCLES 2014
9691/33/M/J/14
[2]
[Turn over
M.Mushtaq Hussain
14
(d) Many computer systems need to store and process real numbers.
A computer uses two bytes to store a real number. The first (Byte 7) stores the mantissa and
the second (Byte 8) the exponent. Both mantissa and exponent use twos complement.
(i) What denary number is represented by Byte 7 and Byte 8?
Byte 7
1
Byte 8
0
[3]
(ii) How can you recognise that this 16-bit pattern (Byte 7 and Byte 8) is normalised?
[1]
(iii) The positive number 2.0 is to be represented as a normalised real number.
Show the mantissa and exponent for this value.
Mantissa
Exponent
[2]
(iv) What is the largest positive number that can be represented? Use the same 8-bit
mantissa and 8-bit exponent.
Show the mantissa and exponent.
Mantissa
Exponent
UCLES 2014
[2]
9691/33/M/J/14
M.Mushtaq Hussain
15
(e) An alternative representation is suggested using a 6-bit mantissa with a 10-bit exponent.
Describe the effect on the numbers which can be represented, compared to the 8-bit
mantissa and 8-bit exponent used earlier.
[2]
UCLES 2014
9691/33/M/J/14
[Turn over
Contact the Teacher: 03215275281
M.Mushtaq Hussain
16
6
A firm of insurance brokers provides quotations. The firm uses two stand-alone computers. Some
customers come in person to the office and are given a printed quotation to take away. Other
customers enquire through the firms website over the Internet.
Each computer creates a file at the start of each day to log and save the quotations issued from
that computer.
There has been a large increase in enquiries, so the firm is to employ three more staff to provide
quotations. The firm will design and implement a Local Area Network (LAN) of five computers.
The LAN must provide all computers with access to the Internet.
(a) The network is to have a bus topology.
Sketch the topology of the LAN. Clearly label all items of hardware.
[5]
UCLES 2014
9691/33/M/J/14
M.Mushtaq Hussain
17
(b) The LAN is implemented and the manager suggests that the firm should introduce an
intranet.
(i) Describe what is meant by an intranet.
[2]
(ii) Describe four benefits that the provision of an intranet would bring to the business.
1
4
[4]
UCLES 2014
9691/33/M/J/14
[Turn over
Contact the Teacher: 03215275281
M.Mushtaq Hussain
18
(c) A quotation is accepted by a customer. The broker must ask the insurance company to
confirm the quotation. A copy of the quotation is sent to the insurance company by
encrypted email.
(i) Explain what is meant by symmetric encryption.
[2]
(ii) When the broker sends an encrypted email to the insurance company, asymmetric
encryption is used. Asymmetric encryption uses both private and public keys.
To send encrypted emails to each other and receive them, Claude and Sobi each know
three keys.
CLAUDE
SOBI
Knows:
Knows:
Y
X
Four keys have the codes W, X, Y and Z as labels. For each of these keys, state who
owns it and whether it is private or public.
W
X
Y
Z
UCLES 2014
[3]
9691/33/M/J/14
M.Mushtaq Hussain
9691 COMPUTING
9691/33
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2014 series for most IGCSE, GCE
Advanced Level and Advanced Subsidiary Level components and some Ordinary Level components.
M.Mushtaq Hussain
Page 2
Mark Scheme
GCE A LEVEL May/June 2014
Syllabus
9691
Paper
33
[1]
(ii) Rule 4
[1]
[1]
[1]
[1]
[3]
[2]
(a) (i)
[1]
(1)
(1)
(1)
(1)
[4]
[1]
(ii)
[1]
[2]
(1)
(1)
[2]
M.Mushtaq Hussain
Page 3
Mark Scheme
GCE A LEVEL May/June 2014
Syllabus
9691
Paper
33
(1)
(1)
(1)
(1)
(1)
(a) A class is the design / the blueprint (from which objects are later created)
The class definition consists of properties and methods
An object is an instance of a class
An object must be based on a class definition
Many objects can exist for the same class
Properties of an object can only be accessed using methods provided (in the
class definition)
(b) Properties and methods of a base class are available to a subclass
A subclass can have properties and methods of its own.
(c) (i) Recognised notation for inheritance
(1)
[3]
[MAX 3]
[MAX 2]
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
THEATRE class
(1)
NoOfSeats :
EventType :
Declared as
Restarant :
[3]
INTEGER
STRING
an ARRAY
BOOLEAN
(1)
(1)
[MAX 8]
(1)
(1)
(1)
(1)
(1)
STADIUM has:
[5]
M.Mushtaq Hussain
Page 5
Mark Scheme
GCE A LEVEL May/June 2014
Syllabus
9691
Paper
33
(d)
SearchSport
IsFound
Current
LACROSSE
FALSE
OUTPUT
Moving right
3
Moving left
6
Found
TRUE
[MAX 5]
One mark per entry (MAX 5)
5
(a) 95
111
[2]
(b) 4057
[2]
(c) 6EF9
[2]
[3]
[1]
0
[2]
(iv)
Mantissa
0
Mantissa
Exponent
Exponent
1
1
(1)
(1)
[2]
M.Mushtaq Hussain
Page 6
Mark Scheme
GCE A LEVEL May/June 2014
Syllabus
9691
Paper
33
[2]
(1)
(1)
(1)
(1)
(1)
(1)
(1)
[MAX 5]
[MAX 2]
[4]
[MAX 2]
(ii)
Claude (W/X)
Sobi (Y/Z)
Claudes Public
Sobis Private
Sobis Public
Claudes Public
Any correct 3
[MAX 3]