Professional Documents
Culture Documents
Candidate Candidate
forename surname
INSTRUCTIONS TO CANDIDATES
• Write your name, centre number and candidate number in the boxes above. Please write clearly and in capital letters.
• Use black ink. HB pencil may be used for graphs and diagrams only.
• Answer all the questions, unless your teacher tells you otherwise.
• Read each question carefully. Make sure you know what you have to do before starting your answer.
• Where space is provided below the question, please write your answer there.
• You may use additional paper, or a specific Answer sheet if one is provided, but you must clearly show your candidate
number, centre number and question number(s).
The firm uses high end computers with high performance CPUs, GPUs and large amounts of RAM.
(i) Give one use the firm might have for GPUs.
[1]
[2]
[1]
(i) State the name of and describe two methods that the operating system can use to divide the contents of
RAM.
Method 1
Name
Description
Method 2
Name
Description
[4]
(ii) Explain, giving an example, why the firm’s computers use operating systems capable of multi-tasking.
[2]
Give one advantage and one disadvantage to the architects’ firm of a client-server set up rather than a peer
to peer setup.
Advantage
Disadvantage
[2]
(ii) The LAN is connected to the Internet via a firewall. Describe the term ‘firewall’.
[1]
[1]
A linked list stores the names of cities on a coach tour in the order they are visited.
[3]
(ii) The tour is amended. The new itinerary is: London, Oxford, Manchester then York. Explain how Birmingham
is removed from the linked list and how York is added. You may use the diagram below to illustrate your
answer.
Often an individual customer’s record needs to be accessed. This is done by searching using the Customer ID.
Explain why a hash table is better suited than a linked list to store the customer records, particularly as the
company acquires more customers.
[4]
The organisation decides to make a copy of Shakespeare’s entire works available as a downloadable text file
from its website. It further decides to compress the file before making it available to download.
(i) State an advantage to the website’s visitors of the file being compressed.
[1]
(ii) Explain why the company should use lossless and not lossy compression.
[3]
The organisation looks at using either run length encoding or dictionary encoding to compress the file
described in part (a).
Discuss the two compression methods and justify which you would recommend. You may refer to the extract of
text below to illustrate your argument.
Let:
A be Customer is under 18
C be Customer is over 60
D be Customer has ID
Q≡ [3]
(b). The cinema has a voucher which promises free popcorn when the voucher is produced whilst buying a soft drink
or bottle of water.
Let:
E be Voucher is shown
R ≡ (E⋀F) ⋁ (E⋀G)
1 1 1
1 1 0
1 0 1
1 0 0
0 1 1
0 1 0
0 0 1
0 0 0
[4]
(E⋀F) ⋁ (E⋀G)
[2]
Most films are now distributed to cinemas digitally. A studio allows cinemas to download its latest film 5 days
before the release date via a private download. It wants to ensure that no cinema shows it before the release
date.
(c). Describe one technical measure the studio could use to ensure that films are not shown early.
[2]
ten DAT 10
[3]
(ii) Complete the table below determining whether the program branches to pass or fail given the following
values in the Accumulator when it is run.
29
30
31
[3]
INP entry
main STA test
BRA entry
fail LDA one
ADD main
BRA
pass LDA
OUT entry
HLT
entry DAT 10
ten DAT 1
one DAT
(i) Give one instruction in the program that when executed, changes the value in the Accumulator.
[1]
(ii) Give one instruction in the program that when executed, changes the value in the Program Counter.
[1]
[1]
(iv) State the value the code outputs for the input 37.
[1]
[2]
(i) Convert the denary number 188 to an unsigned 8-bit binary number.
[1]
[1]
(i) Convert the denary number −44 to an 8-bit binary number with sign and magnitude representation.
[1]
(ii) Convert the denary number −44 to an 8-bit binary number with two’s complement representation.
[1]
(c). Explain how, using bit shift, the unsigned binary number 00101100 can be divided by 4.
[2]
[6]
The forum stores details of its users in the table called Users. An extract of Users is shown below.
1 Zeus 8dfa46a79248037752bba6166fcb34f8 1
2 Hera 74d39d60507eb55e000c6ec5c1265891 0
3 Poseidon b015d770d0208ddcce2c2c719fe29371 0
Describe what is meant by the term ‘primary key’, giving an example from the table above.
[2]
[1]
[2]
[3]
(d).
Sometimes users can have their accounts locked if they behave inappropriately. When this is the case the
locked field is set to 1 rather than 0.
Write an SQL statement that locks the account of the user Hades
[3]
passwordHash and locked have already been extracted from the database before being passed to the
function. It should return the value true if a user should be allowed access to a system and false if they aren’t.
Your function should make use of the pre-written function hash() which takes in a string and returns the hash
of that string.
e.g.
Explain the difference between a HTML id attribute and a HTML class attribute.
[2]
The introduction text should be dark red (using the named colour darkRed).
[6]
(i) State the name of the language used between the script tags.
[1]
Some users have reported that there is a bug and the site says the shop is closed when they log on
between 9 and 10 in the morning.
[1]
(iii) Give one disadvantage of this code being run client side rather than server side.
[1]
[4]
(b). Players are given 10 random letters and asked to find the largest word they can make from those letters. Each
letter can only be used once. The length of the word determines the number of points awarded. e.g. a word with
6 letters would mean 6 points are awarded.
The function validateAnswer takes in the randomLetters as an array of letters and the player’s answer as
a string. It then checks if the word the player has entered only contains letters from the 10 random letters with
each letter being used only once. (At this stage the program doesn’t check if the answer provided is an actual
word.) It then returns a score, out of 10, for a valid word or 0 for an invalid word.
Example
Whereas
And
endFunction
[6]
Give one advantage of storing the words in a binary search tree over an array.
[1]
(d). The software team use a prebuilt library to create the Graphical User Interface.
[2]
(ii) The program is compiled. Explain the process of compilation including how code from the library
becomes part of the finished program, justifying why each stage is necessary.
A B Sum Carry
1 1 0 1
1 0 1 0
0 1 1 0
0 0 0 0
[3]
[4]
(Max 1)
Examiner’s Comments
Some candidates did not apply the use of
GPU to the scenario. Those who did,
generally gained full marks for this
question.
(Max 2)
(Max 1)
ii Multitasking allows the user to run 2 Accept any reasonable work related
more than one program at the same answer
time. (1)
E.g. running CAD software whilst (AO1.1 –
checking emails. (1) 1 mark
AO1.2 –
1 mark )
Examiner’s Comments
Most candidates achieved both marks on
this question. Those who did not, either
explained multi-tasking or gave appropriate
examples. The question asked for both.
Disadvantage:
– Central point of failure. (1)
Examiner’s Comments
(Max 1) To achieve this mark, candidates were
required to show an understanding that
firewalls monitor traffic going to and from a
network, many only discussed one-way
traffic.
iii Prevent unauthorised access to a 1 Accept for MP1 malicious attacks / traffic
network. (1)
To restrict applications that are used
internally that have internet (AO 1.2)
access. (1)
To restrict websites that can be
accessed from within the
company. (1)
To protect the company’s data /
intellectual property. (1)
Examiner’s Comments
(Max 1) Most candidates gave ‘to stop malicious
attacks’ which was awarded as an
interpretation of ‘to protect company data’.
Total 14
– Manchester remains in
original position and pointer
changed to point to the York
node. (1)
In diagram solution, London, Oxford and
Manchester must remain in the same
– The York node points to null positions.
(or terminator). (1)
Examiner’s Comments
Those candidates who scored well in 2ai)
went on to achieve at least some of the
marks here. Many candidates found it
challenging to clearly explain how the
linked list was manipulated. If the question
states that ‘you may use the diagram to
illustrate your answer’, centres should
encourage candidates to do so.
b A linked list requires every node to 4 Some candidates may talk about time
be checked (until the desired record complexity: linked lists being linear / O(n)
is found). (1) and hash table being constant / O(1)
A linked list will take longer to (AO1.2 – Accept these as points 1& 2 and 3 & 4
search (as more nodes are 2 marks conjoined i.e. full marks.
added). (1)
A hash table enables direct access AO2.2 –
to the location of the record. (1)
A hash table will take the same time 2 marks)
to search (as more nodes are
added)/It takes no longer as more
records are added. (1)
Examiner’s Comments
Most candidates gained some credit on
this question by explaining why hash tables
are better suited than linked lists for
searching. Those who did not gain credit
described in some detail how hash tables
were structured, but did not apply their
response to the scenario.
Total 11
Examiner’s Comments
This question was well received by most
(Max 1) candidates, invariably scoring most marks.
b Mark Band 3–High Level (9–12 marks) AO1.1 Points may include but aren’t limited to:
Examiner’s Comments
Candidates were assessed on the quality
of their extended response in this question.
Most candidates could describe each of
the given types of compression
appropriately, with many applying them to
the scenario. Many candidates correctly
concluded that dictionary encoding was the
most appropriate in this case, but few then
went on to give clear and appropriate
justification for their assertion. In general,
most candidates scored well on this
question.
Total 16
1 mark for the ∨ joining the two parts. Accept AB as (A.B) and CD as (C.D)
Examiner’s Comments
In general, most candidates achieved all of
the available marks in these questions.
ii (F∨G) ∧ E 2 Accept:
(AO2.2) (G∨F) ∧ E
Examiner’s Comments
In general, most candidates achieved all of
the available marks in these questions.
Send the key / password out on the (AO2.2) Use Digital Rights Management / DRM…
release date (1)
..To keep content encrypted until given
date.
Examiner’s Comments
Some candidates lost credit on this
question by failing to mention encryption.
Total 11
Examiner’s Comments
Very few candidates did not gain full marks
on this question.
b i LDA (1) 1
SUB (1)
ADD (1) (AO1.2)
INP (1)
(Max 1)
Examiner’s Comments
Most candidates identified correctly, an
instruction which changed the value in the
Accumulator but fewer correctly identified
an instruction which changed the value in
the Program Counter.
ii BRA (1) 1
BRP (1)
BRZ (1) (AO1.2)
(Max 1)
Examiner’s Comments
Most candidates identified correctly, an
instruction which changed the value in the
Accumulator but fewer correctly identified
an instruction which changed the value in
the Program Counter.
iii 20 1
(AO2.1)
Examiner’s Comments
Candidates invariably gave both correct
output values.
iv 40 1
(AO2.1)
Examiner’s Comments
Candidates invariably gave both correct
output values.
v Rounds up (the number input)… (1) 2 Rounds to multiple of ten gets one mark.
Total 12
6 a i 10111100 1
(AO1.2)
Examiner’s Comments
Again, these questions were very well
received by candidates with most scoring
full marks.
ii BC 1
(AO1.2)
b i 10101100 1
(AO1.2)
Examiner’s Comments
Again, these questions were very well
received by candidates with most scoring
full marks.
ii 11010100 1
(AO1.2)
Examiner’s Comments
Generally most candidates stated that two
bit shifts were required but some went on
to state the incorrect direction i.e. left.
d Binary point: shifted four places gives: 6 Correct answer with clear binary
01001.0 (1) subtraction/2’s complement addition
Binary point shifted two places gives: (AO1.2) calculation gives full marks.
010.010 (1)
Examiner’s Comments
Candidates whose solution was presented
in a logical manner tended to score at least
4 marks on this question. Candidates used
different methods to find the solution, all of
which were accepted (provided the logic of
the calculation could be followed).
Centres should advise candidates to
present the layout of their responses to this
type of question in a logical manner.
Total 12
Examiner’s Comments
Well received and answered by most
candidates.
c SELECT passwordHash, locked (1) 3 Do not award first mark for SELECT *
FROM Users (1)
WHERE username=‘Apollo’ (1) (AO 3.2)
Examiner’s Comments
In most cases, candidates who achieved
marks in c) went on to achieve marks in d)
with few candidates achieving all marks in
either. Many candidates did not use correct
SQL statement structure or syntax e.g.
confusing attribute names with string
literals.
Examiner’s Comments
In most cases, candidates who achieved
marks in c) went on to achieve marks in d)
with few candidates achieving all marks in
either. Many candidates did not use correct
SQL statement structure or syntax e.g.
confusing attribute names with string
literals.
Total 15
8 Mark Band 3–High Level AO1.1 Points may include but aren’t limited to:
(7–9 marks)
The candidate demonstrates a (2) AO1 Knowledge and Understanding
thorough knowledge and
understanding issues around AO1.2 Artificial Intelligence (AI) is the study of
computers and the workforce and computers displaying intelligent behaviour
Artificial Intelligence. The material is (usually characterised by decision making).
generally accurate and detailed. (2)
AI techniques include neural networks,
The candidate is able to apply their AO2.1 evolutionary computation, Bayesian
knowledge and understanding networks etc.
directly and consistently to the (2)
context provided. Evidence / Computers are well suited to certain jobs
examples will be explicitly relevant and as AI techniques improve the range of
to the explanation. AO3.3 jobs they can do is likely to increase.
Examiner’s Comments
Candidates were assessed on the quality
of their extended response in this question.
Many candidates offered a balanced
discussion although some of the examples
Total 9
Examiner’s Comments
Few candidates scored more than two
marks on this question. There was a
general lack of attention to detail resulting
in fundamental mistakes e.g. missing close
bracket }; equals (=) instead of colon (:)
when setting attributes.
(AO1.1)
Examiner’s Comments
Well attempted by most candidates with
many scoring two out of a possible three
marks. Some candidates did not gain credit
in iii) because they cited ‘...time taken to
process’ as a disadvantage.
(Max 1)
Total 11
Examiner’s Comments
(Max 4) Most candidates gained some marks on
this question but few achieved full marks.
In general responses lacked attention to
detail and clarity of expression. Centres
should advise candidates that the number
of marks awarded for questions gives an
indication of the number of points required
in the response.
Examiner’s Comments
Many candidates achieved some of the
available marks on this question for
attempting to traverse each letter in the
word and each letter in the random word -
a loop with a nested loop. Some achieved
more marks for comparing the current
letters and outputting the length of the valid
word. Fewer candidates achieved the final
marks for checking if the letter was in the
word or duplicated.
c BS Tree can be searched quicker 1 Accept O(log n) search time rather than
than an array. O(n)
(AO1.2)
Examiner’s Comments
Very few candidates did not achieve this
mark, most correctly stating the advantage
‘faster to search’.
Examiner’s Comments
Those candidates who cited generic
(Max 2) advantages of using subroutines as
opposed to library routines did not gain
credit. The question asked for advantages
to the team of using a library.
ii Mark Band 3–High Level AO1.1 Points may include but are not limited to:
(7–9 marks)
The candidate demonstrates a (2) AO1 Knowledge and Understanding
thorough knowledge and
understanding of how source code is AO1.2 The compiler is effectively a group of
compiled and library code programs.
incorporated. The material is
generally accurate and detailed. (2) The stages of compilation are: lexical
analysis, syntax analysis, code generation
The candidate is able to apply their and optimisation.
knowledge and understanding AO2.1
directly and consistently to the A linker is then used to combine the object
context provided. Evidence / (2) code with the library code to make the final
examples will be explicitly relevant executable.
to the explanation. AO3.3
AO2.1 Application
The candidate provides a thorough (3)
discussion which is well balanced. Source code is input into a compiler
Evaluative comments are program.
consistently relevant and well- 9
considered. The first stage is lexical analysis in which..
Mark Band 2–Mid Level (4–6 marks) The series of tokens and symbol table is
The candidate demonstrates passed onto the next stage, syntax
reasonable knowledge and analysis:
understanding of how source code is Here the code is checked to ensure it
compiled and library code follows the rules of the language.
incorporated; the material is
generally accurate but at times This is often accomplished by placing the
underdeveloped. tokens into a (abstract syntax) tree.
The candidate is able to apply their Where it breaks the rules of the language
knowledge and understanding errors are generated.
directly to the context provided
although one or two opportunities If no rules are broken then it’s passed on to
are missed. Evidence / examples the next stage…
are for the most part implicitly
relevant to the explanation. ..Which is code generation.
The candidate provides a sound Here the object code (accept machine
discussion, the majority of which is code) is created.
focused. Evaluative comments are
for the most part appropriate, (i.e. the binary that is executed by the
although one or two opportunities for processor)
development are missed.
This code may be inefficient..
There is a line of reasoning
presented with some structure. The .. it may contain unnecessary instructions
information presented is in the most or groups of instructions that can be
part relevant and supported by some replaced by simpler ones.
evidence.
Code from the library is likely already
Mark Band 1–Low Level (1–3 marks) compiled.
The candidate demonstrates a basic
knowledge of how source code is And may well have been written in a
compiled and / or library code different language to the main program.
incorporated; the material is basic
and contains some inaccuracies. The main program source code will have
The candidate makes a limited contained lines importing the library code.
attempt to apply acquired knowledge
and understanding to the context A program called a linker can incorporate
provided. the code from the library with the main
program…
The candidate provides a limited …into a single executable file.
discussion which is narrow in focus. An alternative approach is for the main
Judgments if made are weak and executable to link to the compiled library
unsubstantiated. The information is code (i.e. dynamic linking).
basic and communicated in an
unstructured way. The information is
supported by limited evidence and
the relationship to the evidence may
not be clear.
AO3.3 Evaluation
0 marks Lexical analysis is necessary to put the
No attempt to answer the question code into a format which can be read and
or response is not worthy of credit. processed (i.e. parsed) by the syntax
analyser.
Examiner’s Comments
Candidates were assessed on the quality
of their extended response in this question.
Many candidates explained the stages of
compilation very well. Some went on to
describe how code from the library
becomes part of the finished program
equally well. Few justified why each stage
was necessary. Many candidates scored
well on this question.
Total 22
11 a 3
(AO1,1)
Examiner’s Comments
Most candidates scored well on these
questions demonstrating their
understanding of logic gate circuits. Some
candidates simplified the circuit in part b)
which achieved full marks provided the
resultant circuit gave the same output.
Or equivalent.
Or equivalent.
Examiner’s Comments
Most candidates scored well on these
questions demonstrating their
understanding of logic gate circuits. Some
candidates simplified the circuit in part b)
which achieved full marks provided the
resultant circuit gave the same output.
Total 7