You are on page 1of 919

MUHAMMAD ALI KHAN

TOPIC Number of Pages

1. Number System 2 | 31 | 77 | 119 | 142 | 163 | 186 | 266 | 340 | 503 | 527 | 567 | 659 |

673 | 756 | 772 | 801 | 825 | 869 | 897 |

2. Sound | Images | 3 | 62 | 79 | 97 | 105 | 121 | 167 | 232 | 250 | 314 | 341 | 364 | 402 | 426 | 451 | 564 | 583 |
Compression 604 | 637 | 675 | 696 | 706 | 720 | 764 | 803 | 848 | 903 | 909

3. Assembly Language 5 | 32 | 42 | 85 | 128 | 144 | 169 | 187 | 234 | 252 | 270 | 294 | 382 | 406 |

428 | 457 | 472 | 501 | 569 | 587 | 608 | 653 | 676 | 702 | 724 | 750 | 782 |
809 | 850 | 879 | 904
4. Monitoring and 6 | 59 | 743 |
Controlling Systems

5. Internet Communications 7 | 55 | 60 | 102 | 103 | 150 | 236 | 313 | 320 | 404 | 437 | 523 | 562 |

627 | 657 | 729 | 765 | 859 | 886 | 911

6. Input Output Devices 9 | 76 | 164 | 185 | 230 | 249 | 275 | 297 | 366 | 378 | 475 | 518 | 521 |

544 | 560 | 581 | 603 | 614 | 799 |

7. Logic Gates 10 | 39 | 82 | 165 | 184 | 318 | 337 | 362 | 438 | 479 | 539 | 568 | 585 |

606 | 630 | 678 | 708 | 749 | 774 | 798 | 828 | 858 | 872 | 898

8. Von Neumann and OS 12 | 37 | 56 | 98 | 120 | 233 | 256 | 269 | 289 | 292 | 316 | 325 | 336 | 359

410 | 436 | 471 | 492 | 516 | 519 | 538 | 590 | 605 | 675 | 696 | 701 723

| 753 | 781 | 807 | 835 | 877 | 885 | 896 |


9. Database 13 | 125 | 148 | 161 | 192 | 228 | 247 | 268 | 278 | 291 | 298 | 343 | 356 |

389 | 454 | 477 | 497 | 525 | 540 | 565 | 588 | 612 | 635 | 648 | 679 | 733

746 | 778 | 805 | 830 | 854 | 873 | 901


10. Security 33 | 63 | 147 | 152 | 168 | 191 | 494 | 580 | 634 | 758 | 773 | 797 |829 |
853 | 871 |

11. Memory 35 | 75 | 162 | 190 | 324 | 546 | 561 | 629 | 731 |826
MUHAMMAD ALI KHAN
12. IP 57 | 99 | 124 | 380 | 433 | 450 | 468 | 661 | 683 | 698 | 755 |

13. Ethics 58 | 81 | 100 | 123 | 143 | 276 | 296 | 386 | 411 | 432 | 435 | 452 | 456 |

543 | 607 | 652 | 682 | 705 | 748

14. Translator 64 | 107 | 118 | 142 | 267 | 290 | 412 | 455 | 470 | 632 | 647 | 697 | 777 |
833 | 857 |

15. Error Check 83 | 254 | 322 | 339 | 361 | 732 | 900

16. IDE 757 | 776 |


PAGE 1

MUHAMMAD ALI KHAN


PAGE 2

MUHAMMAD ALI KHAN


PAGE 3

MUHAMMAD ALI KHAN


PAGE 4

MUHAMMAD ALI KHAN


PAGE 5

MUHAMMAD ALI KHAN


PAGE 6

MUHAMMAD ALI KHAN


PAGE 7

MUHAMMAD ALI KHAN


PAGE 8

MUHAMMAD ALI KHAN


PAGE 9

MUHAMMAD ALI KHAN


R
T
P
PAGE 10

X
MUHAMMAD ALI KHAN
PAGE 11

MUHAMMAD ALI KHAN


PAGE 12

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 13

ShopSales

FirstName Shop ProductName NoOfProducts Manufacturer


MUHAMMAD ALI KHAN
PAGE 14

SalesPerson (FirstName, Shop)

SalesProducts (FirstName, ProductName, NoOfProducts, Manufacturer)

ShopSales

SalesPerson

FirstName Shop

SalesProducts

FirstName ProductName NoOfProducts Manufacturer


MUHAMMAD ALI KHAN
PAGE 15

SalesProducts
PAGE 16

MUHAMMAD ALI KHAN


PAGE 17

MUHAMMAD ALI KHAN


PAGE 18

MUHAMMAD ALI KHAN


PAGE 19

MUHAMMAD ALI KHAN


PAGE 20

MUHAMMAD ALI KHAN


PAGE 21

MUHAMMAD ALI KHAN


PAGE 22

MUHAMMAD ALI KHAN


PAGE 23

MUHAMMAD ALI KHAN


PAGE 24

MUHAMMAD ALI KHAN


PAGE 25

MUHAMMAD ALI KHAN


PAGE 26

MUHAMMAD ALI KHAN


PAGE 27

MUHAMMAD ALI KHAN


PAGE 28

MUHAMMAD ALI KHAN


PAGE 29

MUHAMMAD ALI KHAN


PAGE 30

MUHAMMAD ALI KHAN


PAGE 31

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 32

First pass or
Activity
second pass
PAGE 33

MUHAMMAD ALI KHAN


PAGE 34

MUHAMMAD ALI KHAN


PAGE 35

MUHAMMAD ALI KHAN


PAGE 36

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 37

1 MAR [PC]
2 PC [PC] + 1
3 MDR [[MAR]]
4 CIR [MDR]

[register]
LDD 35
PAGE 38

MUHAMMAD ALI KHAN


PAGE 39

MUHAMMAD ALI KHAN


PAGE 40

MUHAMMAD ALI KHAN


PAGE 41

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 42

Instruction
Explanation
Op code Operand
PAGE 43

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 44

300 LDD 321


301 INC
302 STO 323
303 LDI 307
304 INC
305 STO 322
306 END
307 320

320 49
321 36
322 0
323 0

320 321 322 323


PAGE 45

MUHAMMAD ALI KHAN


PAGE 46

MUHAMMAD ALI KHAN


PAGE 47

MUHAMMAD ALI KHAN


PAGE 48

MUHAMMAD ALI KHAN


PAGE 49

MUHAMMAD ALI KHAN


PAGE 50

MUHAMMAD ALI KHAN


PAGE 51

MUHAMMAD ALI KHAN


PAGE 52

MUHAMMAD ALI KHAN


PAGE 53

MUHAMMAD ALI KHAN


PAGE 54

MUHAMMAD ALI KHAN


PAGE 55

MUHAMMAD ALI KHAN


PAGE 56

MUHAMMAD ALI KHAN


PAGE 57

MUHAMMAD ALI KHAN


PAGE 58

MUHAMMAD ALI KHAN


PAGE 59

MUHAMMAD ALI KHAN


PAGE 60

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 61

client computer client computer


Internet

file server

mail server
PAGE 62

MUHAMMAD ALI KHAN


PAGE 63

MUHAMMAD ALI KHAN


PAGE 64

MUHAMMAD ALI KHAN


PAGE 65

MUHAMMAD ALI KHAN


PAGE 66

MUHAMMAD ALI KHAN


PAGE 67

MUHAMMAD ALI KHAN


PAGE 68

MUHAMMAD ALI KHAN


PAGE 69

MUHAMMAD ALI KHAN


PAGE 70

MUHAMMAD ALI KHAN


PAGE 71

MUHAMMAD ALI KHAN


PAGE 72

MUHAMMAD ALI KHAN


PAGE 73

MUHAMMAD ALI KHAN


PAGE 74

MUHAMMAD ALI KHAN


PAGE 75

MUHAMMAD ALI KHAN


PAGE 76

MUHAMMAD ALI KHAN


PAGE 77

MUHAMMAD ALI KHAN


PAGE 78

MUHAMMAD ALI KHAN


PAGE 79

MUHAMMAD ALI KHAN


PAGE 80

MUHAMMAD ALI KHAN


PAGE 81

MUHAMMAD ALI KHAN


PAGE 82

MUHAMMAD ALI KHAN


PAGE 83

MUHAMMAD ALI KHAN


PAGE 84

MUHAMMAD ALI KHAN


PAGE 85

MUHAMMAD ALI KHAN


PAGE 86

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 87

800 LDD 810


801 INC
802 STO 812
803 LDD 811
804 ADD 812
805 STO 813
806 END
810 28
811 41
812 0
813 0

810 811 812 813


PAGE 88

MUHAMMAD ALI KHAN


PAGE 89

MUHAMMAD ALI KHAN


PAGE 90

MUHAMMAD ALI KHAN


PAGE 91

MUHAMMAD ALI KHAN


PAGE 92

MUHAMMAD ALI KHAN


PAGE 93

MUHAMMAD ALI KHAN


PAGE 94

MUHAMMAD ALI KHAN


PAGE 95

MUHAMMAD ALI KHAN


PAGE 96

MUHAMMAD ALI KHAN


PAGE 97

MUHAMMAD ALI KHAN


PAGE 98

MUHAMMAD ALI KHAN


PAGE 99

MUHAMMAD ALI KHAN


PAGE 100

MUHAMMAD ALI KHAN


PAGE 101

MUHAMMAD ALI KHAN


PAGE 102

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 103

client computer client computer


Internet

file server

mail server
PAGE 104

MUHAMMAD ALI KHAN


PAGE 105

MUHAMMAD ALI KHAN


PAGE 106

MUHAMMAD ALI KHAN


PAGE 107

MUHAMMAD ALI KHAN


PAGE 108

MUHAMMAD ALI KHAN


PAGE 109

MUHAMMAD ALI KHAN


PAGE 110

MUHAMMAD ALI KHAN


PAGE 111

MUHAMMAD ALI KHAN


PAGE 112

MUHAMMAD ALI KHAN


PAGE 113

MUHAMMAD ALI KHAN


PAGE 114

MUHAMMAD ALI KHAN


PAGE 115

MUHAMMAD ALI KHAN


PAGE 116

MUHAMMAD ALI KHAN


PAGE 117

MUHAMMAD ALI KHAN


PAGE 118

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 119

55

10000011

-102

4E
PAGE 120

MUHAMMAD ALI KHAN


PAGE 121

MUHAMMAD ALI KHAN


PAGE 122

255
153

MUHAMMAD ALI KHAN


PAGE 123

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 124

3.2A.6AA.BBBB

2.0.255.1

6.0.257.6

A.78.F4.J8
PAGE 125

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 126

STUDENT(StudentID, FirstName, LastName, Year, TutorGroup)

CLASS(ClassID, Subject)

CLASS-GROUP(StudentID, ClassID)

CLASS CLASS–GROUP

CLASS-GROUP STUDENT

StudentID FirstName
LastName

LastName
ClassID
MUHAMMAD ALI KHAN
PAGE 127

LDD <address>

LDX <address>

STO <address>

ADD <address>

INC <register>

DEC <register>

CMP <address>

JPE <address>

JPN <address>

JMP <address>

OUT

END

60 0011 0010
61 0101 1101
62 0000 0100
63 1111 1001
64 0101 0101
65 1101 1111
66 0000 1101
67 0100 1101
68 0100 0101
69 0100 0011
...
1000 0110 1001

0 0 0 0 1 0 0 0
MUHAMMAD ALI KHAN
PAGE 128

LDX 60

DEC IX
MUHAMMAD ALI KHAN
PAGE 129

50 LDD 100

51 ADD 102

52 STO 103

53 LDX 100

54 ADD 100

55 CMP 101

56 JPE 58

57 JPN 59

58 OUT

59 INC IX

60 LDX 98

61 ADD 101

62 OUT

63 END

...

100 20

101 100

102 1

103 0

1
MUHAMMAD ALI KHAN
PAGE 130

100 101 102 103

20 100 1 0 1
PAGE 131

MUHAMMAD ALI KHAN


PAGE 132

MUHAMMAD ALI KHAN


PAGE 133

MUHAMMAD ALI KHAN


PAGE 134

MUHAMMAD ALI KHAN


PAGE 135

MUHAMMAD ALI KHAN


PAGE 136

MUHAMMAD ALI KHAN


PAGE 137

MUHAMMAD ALI KHAN


PAGE 138

MUHAMMAD ALI KHAN


PAGE 139

MUHAMMAD ALI KHAN


PAGE 140

MUHAMMAD ALI KHAN


PAGE 141

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 142

01001101

82

11001011

198
PAGE 143

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 144

LDD <address>

LDX <address>

STO <address>

ADD <address>

INC <register>

DEC <register>

CMP <address>

JPE <address>

JPN <address>

JMP <address>

OUT

END

1 1 0 0 1 1 0 1

INC IX
MUHAMMAD ALI KHAN
PAGE 145

LDX 90

DEC ACC

STO 90

INC IX

LDX 90

DEC ACC

CMP 90

JPE 29

JPN 31

ADD 90

OUT

ADD 93

STO 93

OUT

END

90

55

34

2
MUHAMMAD ALI KHAN
PAGE 146

90 91 92 93

2 90 55 34 2
PAGE 147

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 148

STUDENT

StudentID FirstName LastName Tutor

QUALIFICATION

QualCode Level Subject

STUDENT-QUALIFICATION

QualCode StudentID Grade DateOfAward

STUDENT
STUDENT-QUALIFICATION
MUHAMMAD ALI KHAN
PAGE 149

QUALIFICATION
STUDENT-QUALIFICATION

StudentID Grade DateOfAward


QualCode

FirstName LastName QualCode


STUDENT-QUALIFICATION Grade
PAGE 150

MUHAMMAD ALI KHAN


PAGE 151

MUHAMMAD ALI KHAN


PAGE 152

MUHAMMAD ALI KHAN


PAGE 153

MUHAMMAD ALI KHAN


PAGE 154

MUHAMMAD ALI KHAN


PAGE 155

MUHAMMAD ALI KHAN


PAGE 156

MUHAMMAD ALI KHAN


PAGE 157

MUHAMMAD ALI KHAN


PAGE 158

MUHAMMAD ALI KHAN


PAGE 159

MUHAMMAD ALI KHAN


PAGE 160

MUHAMMAD ALI KHAN


PAGE 161

MUHAMMAD ALI KHAN


PAGE 162

MUHAMMAD ALI KHAN


PAGE 163

MUHAMMAD ALI KHAN


PAGE 164

MUHAMMAD ALI KHAN


R

W
T
PAGE 165

X
MUHAMMAD ALI KHAN
PAGE 166

MUHAMMAD ALI KHAN


PAGE 167

MUHAMMAD ALI KHAN


PAGE 168

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 169

LDD <address>
address
LDX <address>

STO <address>
ADD <address>
CMP <address> address
address
JPE <address>

address
JPN <address>

JMP <address>

OUT

END

0110 0100
0111 1100
1001 0111
0111 0011
1001 0000
0011 1111
0000 1110
1110 1000
1000 1110
1100 0010

1011 0101

LDD 802
LDX 800
PAGE 170

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 171

LDD 800
ADD 801
STO 802
LDD 803
CMP 802
JPE 107
JPN 110
STO 802
OUT
JMP 112
LDD 801
OUT
END

40
50
0
90

40 50 0 90
PAGE 172

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 173

Cambridge International Examinations


Cambridge International Advanced Subsidiary and Advanced Level

COMPUTER SCIENCE 9608/11


Paper 1 Written Paper October/November 2016
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2016 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is the registered trademark of Cambridge International Examinations.

This document consists of 10 printed pages.

© UCLES 2016 [Turn over


MUHAMMAD ALI KHAN
PAGE 174

Page 2 Mark Scheme Syllabus Paper


Cambridge International AS/A Level – October/November 2016 9608 11

1 (a) One mark for each correct line.


Two lines from any box on left means no mark for that description.

Description Database term

Secondary key
Any object, person or thing about
which it is possible to store data

Candidate key

Dataset organised in rows and


columns; the columns form the
structure and the rows form the
content
Entity

Any attribute or combination of


attributes that can qualify as a unique Foreign key
key

Primary key
Attribute(s) in a table that link to a
primary key in another table to form a
relationship

Table

Attribute or combination of attributes


that is used to uniquely identify a
record Tuple

[5]

© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 175

Page 3 Mark Scheme Syllabus Paper


Cambridge International AS/A Level – October/November 2016 9608 11

(b) Any three from:


Ensures related data in tables are consistent

If one table has a foreign key (the ‘foreign’ table)


then it is not possible to add a record to that table / the ‘foreign’ table
unless there is a corresponding record in the linked table with a corresponding
primary key (the ‘primary’ table)
Cascading delete
If a record is deleted in the ‘primary’ table
all corresponding linked records in ‘foreign’ tables must also be deleted

Cascading update
If a record in the ‘primary’ table is modified
all linked records in foreign tables will also be modified [3]

2 (a) Any two from:

DRAM has to be refreshed / charged


// SRAM does not request a refresh

DRAM uses a single transistor and capacitor


// SRAM uses more than one transistor to form a memory cell
// SRAM has more complex circuitry

DRAM stores each bit as a charge


// SRAM each bit is stored using a flip-flop / latch

DRAM uses higher power( because it requires more circuitry for refreshing)
// SRAM uses less power (no need to refresh)

DRAM less expensive (to purchase / requires fewer transistors )


// SRAM is more expensive (to buy as it requires more transistors)

DRAM has slower access time / speed (because it needs to be refreshed)


// SRAM has faster access times

DRAM can have higher storage / bit / data density


// SRAM has lower storage / bit / data density

DRAM used in main memory


// SRAM used in cache memory [2]

© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 176

Page 4 Mark Scheme Syllabus Paper


Cambridge International AS/A Level – October/November 2016 9608 11

(b) (i) Any two from

The hardware is unusable without an OS // hides complexity of hardware from user

Acts as an interface / controls communications between user and hardware /


hardware and software

Provides software platform / environment on which other programs can be run [2]

(ii) Any two from:

Process / task / resource management

Main memory management

Peripheral / hardware / device management

File / secondary storage management

Security management

Provision of a software platform / environment on which other programs can be run


– only if not given in part (b)(i)

Interrupt handling

Provision of a user interface run – only if not given in part (b)(i) [2]

(c) Any two from:

A DLL file is a shared library file

Code is saved separately from the main .EXE files

Code is only loaded into main memory when required at run-time

The DDL file can be made available to several applications (at the same time) [2]

© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 177

Page 5 Mark Scheme Syllabus Paper


Cambridge International AS/A Level – October/November 2016 9608 11

3 (a) (i) 0 0 1 0 1 1 1 0 [1]

(ii) 1 1 0 1 0 0 1 0 [1]

(iii) 2 E [1]

(b) (i) One mark for the explanation and one mark for the example

Each denary digit is written as a 4-bit binary number


Example: 46 = 0100 0110 [2]

(ii) One mark for the explanation and one mark for the example

Binary number is split up into groups of 4 bits (starting from the right)
// Each group of 4 bits is converted to a denary digit
Example: 0011 0111 = 37
[2]

4 (i) Keyboard
Any two from:

Uses switches and circuits to translate keystrokes into signals the computer can
understand
The key matrix is a grid of circuits / three layers of plastic underneath the keys
Each circuit is broken beneath the key / middle layer contains holes
When key pressed, a circuit is made / completed and a signal is sent
Processor compares location of signal from key matrix to a character map stored on
ROM
A character code for each key press is saved in a keyboard buffer [2]

(ii) Optical Disc


Any two from:

Drive motor is used to spin the disc


Tracking mechanism moves the laser assembly
A lens focuses the laser onto the disc
Laser beam is shone onto disc to read / write
Surface of disc has a reflective metal layer / phase change metal alloy
Track(s) on the disc have sequence of pits and lands / amorphous and crystalline state
Reflected light in then encoded as a bit pattern [2]

© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 178

Page 6 Mark Scheme Syllabus Paper


Cambridge International AS/A Level – October/November 2016 9608 11

(iii) Optical mouse


Any two from:

Laser / light shines onto a surface


Through a (polished) ring at the base
The light is reflected from the surface through the ring
Sensor detects reflected light
Capturing details / photograph of surface (under the ring)
At about 1500 times per second
As the mouse moves the sensor detects changes in the surface detail / photograph
Which are translated into movement (change of x and y co-ordinates)
The processor/software updates the position of the cursor on the screen [2]

(iv) Scanner
Any two from:

Main component of a scanner is a CCD array


CCD is a collection of light sensitive diodes
Laser beam / light is shone onto the source document/barcode
The scanned image reaches the CCD through mirrors and lenses
Sensors detect levels of reflected light
Brighter light results in greater electrical charge
Light intensity is converted (by software) to a digital value [2]

© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 179

Page 7 Mark Scheme Syllabus Paper


Cambridge International AS/A Level – October/November 2016 9608 11

5 (a) (i) One mark for each correct gate.

[5]

(ii) R.T T .W // (R AND NOT T) OR (T AND NOT W) [2]

(iii) One mark for each pair of lines as shaded.

INPUT Working space


OUTPUT
X
R T W

0 0 0 0

0 0 1 0

0 1 0 1

0 1 1 0

1 0 0 1

1 0 1 1

1 1 0 1

1 1 1 0
[4]

© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 180

Page 8 Mark Scheme Syllabus Paper


Cambridge International AS/A Level – October/November 2016 9608 11

6 Any four from:

User needs high-speed broadband (connection)


Data is streamed to a buffer (in the computer)
Buffering stops video pausing as bits streamed
As buffer is emptied, it fills up again so that viewing is continuous
Actual playback is (a few seconds) behind the time the data is received by computer [4]

7 (a) One mark for the name and one mark for the explanation for three utility programs

Disk formatter
Prepares a hard disk to allow data to be stored on it

Virus checker
Checks for viruses and then quarantines removes any virus found

File compression
Reduces file size by removing redundant details (lossy / lossless)

Backup software
Makes copy of files on another medium in case of corruption / loss of data

Firewall
Prevents unauthorised access to computer system from external sources [6]

(b) Four from:

Bitmap is made up of pixels


// Vector graphic store a set of instructions about how to draw the shape

Bitmap files are usually bigger than vector graphics files // Take up more memory space

Enlarging a bitmap can mean the image is pixelated


// vector graphic can be enlarged without the image becoming pixelated

Bitmap images can be compressed (with significant reduction in file size)


// Vector graphic images do not compress well

Bitmaps are suitable for photographs / scanned images


// Vector graphics are suitable for more geometric shapes

Bitmap graphics use less processing power than vector graphics

Individual elements of a bitmap cannot be grouped


// Individual elements of a vector graphic can be grouped

Vector graphics need to be ‘rasterised’ in order to display or print [4]

© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 181

Page 9 Mark Scheme Syllabus Paper


Cambridge International AS/A Level – October/November 2016 9608 11

(c) (i) Hackers can still access the data (and corrupt it, change it or delete it)
Encryption simply makes data incomprehensible (without decryption key / algorithm)
[2]

(ii) Any two from:

This is an explanation of data verification (not validation)


Data validation ensures that data is reasonable / sensible / within a given criteria
Original data may have been entered correctly but is not reasonable (e.g. age of
210) [2]

(iii) A password does not prevent unauthorised access, it makes it more difficult
Password can be guessed (if weak) // Password can be stolen // A relevant example
of misappropriation of password [2]

8 (a) (i)
Accumulator: 1 0 0 1 0 1 1 1
[1]

(ii) One mark for answer and two marks for explanation

Accumulator: 1 1 0 0 0 0 1 0

Index Register contains 1001 = 9


800 + 9 = 809 [3]

(b) (i) ONE mark for each correct row.

Memory address
ACC OUTPUT
800 801 802 803

40 50 0 90

40

90 90

90 90

[4]

(ii) 107 [1]

© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 182

Page 10 Mark Scheme Syllabus Paper


Cambridge International AS/A Level – October/November 2016 9608 11

(c) (i) Any two from:

Only 128 / 256 characters can be represented


Uses values 0 to 127 (or 255 if extended form) / one byte
Many characters used in other languages cannot be represented
In extended ASCII the characters from 128 to 255 may be coded differently in
different systems [2]

(ii) Any two from:

Uses 16, 24 or 32 bits / two, three or four bytes


Unicode is designed to be a superset of ASCII
Designed so that most characters (in other languages) can be represented
[2]

© UCLES 2016
PAGE 183

MUHAMMAD ALI KHAN


PAGE 184

MUHAMMAD ALI KHAN


PAGE 185

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 186

93

3A
–65

58
0100 1001

–63

01011101
73

49

11000001

–93
MUHAMMAD ALI KHAN
PAGE 187

LDD <address>

address
LDX <address>

LDI <address>

STO <address>

INC <register>

ADD <address>

END

0000 0010
1001 0011
0111 0011
0110 1011
0111 1110
1011 0001
0110 1000
0100 1011

1001 1110
MUHAMMAD ALI KHAN
PAGE 188

LDD 102

LDX 101

LDI 103
MUHAMMAD ALI KHAN
PAGE 189

LDD 810
INC ACC
STO 812
LDD 811
ADD 812
STO 813
END

28
41
0
0

Memory address
ACC

28 41 0 0
PAGE 190

MUHAMMAD ALI KHAN


PAGE 191

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 192

MEMBER BOOKING CLASS

MEMBER CLASS

BOOKING
MUHAMMAD ALI KHAN
PAGE 193

CLASS ClassID

ClassID Description StartDate ClassTime NoOfSessions AdultsOnly

CLASS
MUHAMMAD ALI KHAN
PAGE 194

Cambridge International Examinations


Cambridge International Advanced Subsidiary and Advanced Level

COMPUTER SCIENCE 9608/12


Paper 1 Written Paper October/November 2016
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2016 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is the registered trademark of Cambridge International Examinations.

This document consists of 11 printed pages.

© UCLES 2016 [Turn over


MUHAMMAD ALI KHAN
PAGE 195

Page 2 Mark Scheme Syllabus Paper


Cambridge International AS/A Level – October/November 2016 9608 12

1 (a) ONE mark for each correct gate.

[6]

(b) ONE mark for each pair of rows.

Working space

B S P X

0 0 0 1

0 0 1 1

0 1 0 1

0 1 1 0

1 0 0 0

1 0 1 0

1 1 0 1

1 1 1 0

[4]

© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 196

Page 3 Mark Scheme Syllabus Paper


Cambridge International AS/A Level – October/November 2016 9608 12

2 (a) The number of images / frames recorded per second / unit time.
// The frequency with which the images/frames are recorded.
[1]

(b) ONE mark per bullet point below. MAX THREE marks per type of encoding.

Interlaced encoding

The data from a single frame are encoded as two separate fields.
One containing the data for the even numbered rows / lines and the other has the data
for the odd numbered rows / lines.
The image is rendered by alternating between the even field and the odd field (of each
successive frame).
The viewer sees data from two frames simultaneously
The rate of picture display (the field rate) is twice the rate of image frame display (the
frame rate).
Originally used in television broadcasting and adapted for video recordings.
Produces what appears to the eye to be a high refresh rate.
Halves the transmission bandwidth requirements.

Progressive encoding

Stores the data for an entire frame and displays all the frame data at the same time.
The rate of picture display is the same as the frame rate.
Used by traditional film / video digitised from a film camera / computer displays
progressive encoding.
High bandwidth requirements.
[4]

(c) (i) ONE mark per term.

Description Term

Pixels in two video frames have the same value


in the same location. There is duplication of data Temporal redundancy
between frames.

A sequence of pixels in a single video frame have


Spatial redundancy
the same value.
[2]

(ii) (File) compression


[1]

© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 197

Page 4 Mark Scheme Syllabus Paper


Cambridge International AS/A Level – October/November 2016 9608 12

3 ONE mark for each letter in the correct place.

Then ONE mark for any pair of letters in the correct order, but not in the correct place

1 The application program executes a statement to


read a file.

2 G

3 The operating system begins to spin the hard disk, if


it is not currently spinning.

4 F

5 D

6 H

7 C

8 B

9 A

10 E
[8]

© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 198

Page 5 Mark Scheme Syllabus Paper


Cambridge International AS/A Level – October/November 2016 9608 12

4 ONE mark for each correct line.

Extra lines from left hand box, no mark for that box.
93

Hexadecimal:

3A
- 65

BCD representation:
58
0100 1001

- 63

Binary integer:

01011101
73

Two’s complement
binary integer: 49
11000001

- 93

[4]

© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 199

Page 6 Mark Scheme Syllabus Paper


Cambridge International AS/A Level – October/November 2016 9608 12

5 (a) (i)

0 1 1 1 0 0 1 1
[1]

(ii) ONE mark for Accumulator contents, ONE mark for the explanation.

1 0 1 1 0 0 0 1

Index Register holds the value 4; 101 + 4 = 105 so load data from address 105
[2]

(iii) ONE mark for Accumulator contents, TWO marks for the explanation.

0 1 0 0 1 0 1 1

Memory address 103 contains the value 107


So address 107 is the address from which to load the data [3]

(b) ONE mark for each correct row.

Memory address

ACC 810 811 812 813

28 41 0 0

28

29

29

41

70

70

[6]

© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 200

Page 7 Mark Scheme Syllabus Paper


Cambridge International AS/A Level – October/November 2016 9608 12

6 (a) ONE mark for each difference from the bullet points below.

RAM loses content when power turned off / volatile memory / temporary memory
ROM does not lose content when power turned off / non-volatile memory / permanent
memory

Data in RAM can be altered / deleted / read from and written to


ROM is read only / cannot be changed / altered / deleted

RAM stores files / data / operating system currently in use


ROM is used to store BIOS / bootstrap / pre-set instructions [2]

(b) THREE from:

DRAM has to be refreshed / charged


// SRAM does not request a refresh

DRAM uses a single transistor and capacitor


// SRAM uses more than one transistor to form a memory cell
// SRAM has more complex circuitry

DRAM stores each bit as a charge


// SRAM each bit is stored using a flip-flop/latch

DRAM uses higher power (because it requires more circuitry for refreshing)
//SRAM uses less power (no need to refresh)

DRAM less expensive (to purchase / requires fewer transistors)


// SRAM is more expensive (to buy as it requires more transistors)

DRAM has slower access time / speed (because it needs to be refreshed)


// SRAM has faster access times

DRAM can have higher storage / bit / data density


// SRAM has lower storage / bit / data density

DRAM used in main memory


// SRAM used in cache memory
[3]

© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 201

Page 8 Mark Scheme Syllabus Paper


Cambridge International AS/A Level – October/November 2016 9608 12

7 ONE mark per bullet point, MAX TWO marks per task.

Process / resource management


Scheduling of processes / multi-tasking / multi-programming etc.
Resolution of conflicts when two or more processes require the same resource

Main memory management


Memory protection to ensure that two programs do not try to use the same space
Use of virtual memory
Deciding which processes need to be in main memory at any one time
Location of processes within the memory
By example, e.g. when process terminates, memory is made available

Peripheral / hardware / device management


Installation of appropriate driver software
Controls access to data being sent to / from hardware / peripherals
Controls access to hardware / peripherals
Manages communication between devices / hardware and software

File / secondary storage management


Maintains directory structures
Provides file naming conventions
Controls access

Security management
Makes provision for recovery when data is lost
Provides usernames and passwords / encryption / user accounts
Prevents unauthorised access
Ensures privacy of data

Provision of a software platform / environment


On which other programs can be run

Interrupt handling
Identifies priorities of interrupts
Save current memory / process values / saves data on power outage
Loads appropriate Interrupt Service Routine (ISR)
Any relevant example
[4]

© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 202

Page 9 Mark Scheme Syllabus Paper


Cambridge International AS/A Level – October/November 2016 9608 12

8 (a) ONE mark for each bullet point from MAX TWO groups.

The code is already written


(So the programmer is not starting over again) which saves time

The code will have been used by many people


So it should be already thoroughly tested // relatively error-free

The programmer can use, e.g. mathematical / graphics functions, etc. (may not know
how to code)
Can be sure that the function will perform as it should // simplifies the program.

The code should conform to industry standards


And therefore contribute towards a more robust program
[4]

(b) (i) ONE mark for each benefit, and ONE mark for a further expansion.

The executable file is smaller / the executable does not contain all the library
routines
DLL files are only loaded into memory when required.

Changes / improvements / error correction to the DLL file code are done
independently of the main program...
So there is no need to recompile the main program
All programs using it will benefit

A single DLL file can be made available to several application programs...


Saving space in memory / easing the pressure on memory
[4]

(ii) ONE mark for each bullet point from MAX ONE group.

The executable code is not self-contained


the DLL file(s) needed to be included at run time.

Appropriate (linking) software must be available at run-time


to link / include / import the DLL files.

The DLL file must be present


otherwise (unable to find X.dll) errors

Unexpected changes to the DLL file / corrupted DLL file


could mean the program stops working as expected

Malicious changes to the DLL file


could install a virus on the user’s computer / related files could be corrupted

[2]

© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 203

Page 10 Mark Scheme Syllabus Paper


Cambridge International AS/A Level – October/November 2016 9608 12

9 (a) ONE mark for each reason and ONE mark for a further explanation. MAX THREE reasons.

Reduced data redundancy / data duplication


Data is stored in (separate) linked tables

The database (generally) stores data only once / data need only be updated once
Improved data consistency / integrity / associated data will be automatically
updated / easier to maintain the data / elimination of unproductive maintenance

Complex queries can be more easily written


To search / find specific data // specific example related to the Health Club

Fields can be more easily added to or removed from tables


Without affecting existing applications (that do not use these fields)

Program-data dependence is overcome


Changes to the data (design) do not require changes to programs // changes to programs
do not require changes to data // the data can be accessed by any appropriate program

Security is improved
Each application only has access to the fields it needs // different users can be given
different access rights

Different users can be given different views of the data / data privacy is maintained
So they do not see confidential information

Allows concurrent access


Record locking prevents two users updating the same record at the same time // record
locking assures data consistency
[6]

© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 204

Page 11 Mark Scheme Syllabus Paper


Cambridge International AS/A Level – October/November 2016 9608 12

(b) ONE mark for each correct relationship as shown.

[2]

(c) An example of a script is shown, but different syntax may be used.

CREATE TABLE CLASS (


ClassID VARCHAR(5),
Description VARCHAR(30),
StartDate DATE,
ClassTime TIME,
NoOfSessions INT,
AdultsOnly BIT,
PRIMARY KEY(ClassID)
);

Mark as follows:
1 mark for CREATE TABLE CLASS and ();
1 mark for PRIMARY KEY(ClassID)
1 mark for both ClassID VARCHAR(5),and Description VARCHAR(30),
1 mark for both StartDate DATE, and ClassTime TIME,
1 mark for NoOfSessions INT,
1 mark for AdultsOnly BIT,
[6]

© UCLES 2016
PAGE 205

MUHAMMAD ALI KHAN


PAGE 206

MUHAMMAD ALI KHAN


PAGE 207

MUHAMMAD ALI KHAN


PAGE 208

MUHAMMAD ALI KHAN


PAGE 209

MUHAMMAD ALI KHAN


PAGE 210

MUHAMMAD ALI KHAN


PAGE 211

MUHAMMAD ALI KHAN


PAGE 212

MUHAMMAD ALI KHAN


PAGE 213

MUHAMMAD ALI KHAN


PAGE 214

MUHAMMAD ALI KHAN


PAGE 215

MUHAMMAD ALI KHAN


PAGE 216

MUHAMMAD ALI KHAN


PAGE 217

MUHAMMAD ALI KHAN


PAGE 218

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 219

Cambridge International Examinations


Cambridge International Advanced Subsidiary and Advanced Level

COMPUTER SCIENCE 9608/11


Paper 1 Written Paper May/June 2017
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This document consists of 8 printed pages.

© UCLES 2017 [Turn over


MUHAMMAD ALI KHAN
PAGE 220
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

1(a) Many-to-one 1

1(b)(i) A-NURSE(NurseID, FirstName, FamilyName, WardName) 1

1(b)(ii) The primary key WardName in the A-WARD table 1 2


links to the foreign key WardName in the A-NURSE table. 1

1(c)(i) Many-to-many relationship 1

1(c)(ii) B-WARD-NURSE(WardName, NurseID) 2

Both attributes (with no additions) 1


Joint primary key correctly underlined 1

1(c)(iii) 2
B-NURSE B-WARD

B-WARD-NURSE

Correct relationship between B-NURSE and B-WARD-NURSE 1


Correct relationship between B-WARD and B-WARD-NURSE 1

1(d)(i) SELECT NurseID, FamilyName 1 3


FROM B-NURSE 1
WHERE Specialism = 'THEATRE'; 1

1(d)(ii) UPDATE B-NURSE 1 3


SET FamilyName = 'Chi' 1
WHERE NurseID = '076'; 1

© UCLES 2017 Page 2 of 8


MUHAMMAD ALI KHAN
PAGE 221
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

2(a)(i) A laser beam and a rotating mirror are used to draw an 3


1
image of the page on the photosensitive drum.
C // The image is converted on the drum into an
2
electrostatic charge.
3 Electrostatic charge attracts toner.
4 The charged paper is rolled against the drum.
D // The oppositely-charged paper picks up the toner
5 particles from the drum. After picking up the toner, the
paper is discharged to stop it clinging to the drum.
A // The paper passes through a fuser, which heats up
6 the paper. The toner melts and forms a permanent
image on the paper.
B // The electrical charge is removed from the drum and
7
the excess toner is collected.

C in the correct place 1


DA, 1
AB 1

2(a)(ii) Inkjet printer 1

2(b) Hard disk drive // HDD 1 3


Solid state drive //SSD // flash memory 1
One from:
Hard disk
Inexpensive per unit of storage 1
Larger storage capacity than flash drive 1

Solid state storage


No moving parts / noise 1
Robust 1
Low latency // Fast read/write time 1

© UCLES 2017 Page 3 of 8


MUHAMMAD ALI KHAN
PAGE 222
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

3(a) Sampling rate 2


The number of samples taken per unit time // the number of times the amplitude is
measured per unit time 1
Increasing the sampling rate will increase the accuracy / precision of the digitised
sound // Increasing the sampling rate will result in smaller quantisation errors. 1

3(b)(i) Pixel 2
Smallest picture element which can be drawn 1
Screen resolution
The number of pixels which can be viewed horizontally and vertically on the screen //
or by example - A typical screen resolution is 1680 pixels 1080 pixels. 1

3(b)(ii) 8 1

3(b)(iii) Working: Max two from: 3


Number of pixels is 2048 512 1
One pixel will be stored as one byte 1
Number of kilobytes = (2048 512) / 1024 1
Answer: One mark:
Number of kilobytes = 1024 KB 1

3(b)(iv) One from: 1

Confirmation that the file is a BMP 1


File size 1
Location/offset of image data within the file 1
Dimensions of the image in pixels // image resolution 1
Colour depth (bits per pixel) 1
Type of compression used, if any 1

© UCLES 2017 Page 4 of 8


MUHAMMAD ALI KHAN
PAGE 223
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

4(a)(i) 500 1

4(a)(ii) 496 1

4(a)(iii) 502 1

4(a)(iv) 86 1

4(b) 3
0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 1

0 0 0 0 0 1 1 0 0 1 1 0 0 0 0 1

Both correct op codes 1


Operand 0001 0001 1
Operand 0110 0001 1

4(c) 256 1

4(d)(i) 07 C2 2

07 1
C2 1

4(d)(ii) LDI 63 2

LDI 1
63 1

© UCLES 2017 Page 5 of 8


MUHAMMAD ALI KHAN
PAGE 224
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

5(a)(i) Count the number of one bits in the first seven bit positions 1 2
Add a 0 or 1 to bit position 0, to make the count of one bits an odd number 1

5(a)(ii) A=1 1
B=1

5(a)(iii) Two from: 2

A parity bit is worked out for each column 1


The computer checks the parity of each bit position in parity byte // the computer
generates copy of the parity byte and compares 1
If incorrect parity then there is an error in the data received // No parity error
means no error in the data received 1
The position of the incorrect bit can be determined 1

5(b)(i) 2

5(b)(ii) Three from: 3

Consider each row in sequence 1


Identify any row with incorrect parity 1
Repeat the process for each column in sequence 1
Identify where a row and column with incorrect parity intersect 1

© UCLES 2017 Page 6 of 8


MUHAMMAD ALI KHAN
PAGE 225
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

6(a) 3

The user closes the Spreadsheet


program

The user selects the Save


command to save their
spreadsheet file

The user selects the Print


command to output their
spreadsheet file

One mark for each correct line from each left hand box to max three marks.

6(b)(i) File compression software 1

6(b)(ii) Backup software 1

6(b)(iii) Disk repair software 1

6(b)(iv) Anti-virus software 1

© UCLES 2017 Page 7 of 8


MUHAMMAD ALI KHAN
PAGE 226
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

7(a) Two from: 2


The user’s web browser is the client software 1
The requested web page has program code / script embedded within it 1
This code is interpreted by the web browser 1

7(b) Four from: Max 4


The browser parses the URL to obtain the Domain Name 1
The browser software passes the Domain Name to the nearest Domain Name
Server (DNS) 1
The DNS stores a list of Domain Names and matching IP addresses 1
The DNS Name Resolver looks for the Domain Name in its database 1
If found the corresponding IP address is returned to the originator 1
If not found the request is forwarded to another higher level DNS 1
The original DNS adds the returned IP address to its cache 1
The original DNS returns the IP address to the originator 1
The browser uses the IP address to request the required web page from the web
server 1
The web server retrieves the page and delivers it to the originator 1
The browser software interprets the script and displays the web page 1

7(c)(i) Message1, Message2 1 2


x 1

7(c)(ii) 6 – 19 1

7(c)(iii) 11 1

7(c)(iv) Checks that the product code has not be left blank // presence check on product 1
code

7(c)(v) Two checks from: Max 4


One mark for check and one mark for description

Range check 1
Check the number entered is (say) between 1 and 100 1

Format check 1
Checks the product code is a particular format // Checks the number has digit
characters only // by example 1

Length check 1
The number of items has exactly five characters 1

Existence check 1
To ensure the product code has been assigned 1

© UCLES 2017 Page 8 of 8


PAGE 227

MUHAMMAD ALI KHAN


PAGE 228

MUHAMMAD ALI KHAN


PAGE 229

MUHAMMAD ALI KHAN


PAGE 230

MUHAMMAD ALI KHAN


PAGE 231

MUHAMMAD ALI KHAN


PAGE 232

MUHAMMAD ALI KHAN


PAGE 233

MUHAMMAD ALI KHAN


PAGE 234

MUHAMMAD ALI KHAN


PAGE 235

MUHAMMAD ALI KHAN


PAGE 236

MUHAMMAD ALI KHAN


PAGE 237

MUHAMMAD ALI KHAN


PAGE 238

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 239

Cambridge International Examinations


Cambridge International Advanced Subsidiary and Advanced Level

COMPUTER SCIENCE 9608/12


Paper 1 Written Paper May/June 2017
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This document consists of 7 printed pages.

© UCLES 2017 [Turn over


MUHAMMAD ALI KHAN
PAGE 240
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

1(a) Many-to-many relationship 1

1(b)(i) 3

Both entities correctly labelled 1


Correct relationship between SHOP and SHOP-SUPPLIER 1
Correct relationship between SUPPLIER and SHOP-SUPPLIER 1

1(b)(ii) Table Primary key Foreign keys(s) Explanation 5


(if any)
SHOP ShopID None

SUPPLIER SupplierID None

SHOP-SUPPLIER ShopID AND ShopID OR To create a link


SupplierID SupplierID with the SHOP or
SUPPLIER
(or both) table.

SHOP has primary key ShopID and SUPPLIER has primary key
SupplierID 1
SHOP-SUPPLIER has primary key ShopID + SupplierID 1
Both SHOP and SUPPLIER show foreign key as ‘None’ 1
SHOP-SUPPLIER shows foreign key ShopID or SupplierID 1
Explanation for SHOP-SUPPLIER foreign key describes ShopID or
SupplierID creating a link 1

1(b)(iii) Two from: Max 2


The database user will frequently want to search on contact name 1
The contact name attribute has been indexed 1
It allows for a fast/faster search using contact name 1

1(c)(i) SELECT ShopID, Location 1 3


FROM SHOP 1
WHERE RetailSpecialism = 'GROCERY'; 1

1(c)(ii) INSERT INTO SHOP-SUPPLIER 1 3


(ShopID, SupplierID) 1
VALUES (8765, 'SUP89'); 1

© UCLES 2017 Page 2 of 7


MUHAMMAD ALI KHAN
PAGE 241
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

2(a) One mark for each pair of rows 2

Type of printer
Laser Inkjet
Impact printer
1
Non-impact printer

Line printer
1
Page printer

2(b)(i) Five from: Max 5


The print head contains a large number of very small nozzles 1
Ink is fed to each nozzle from a reservoir 1
The print head fires droplets of ink onto the paper 1
The print head moves horizontally across the paper 1
Either:
Tiny resistors create heat inside each nozzle 1
The heat vaporises ink to create a bubble 1
When the bubble pops the ink is deposited on the page 1
The collapsing bubble creates a partial vacuum in the nozzle 1
And ink is drawn from the reservoir ready for printing the next dot 1
Or:
There is a piezo crystal at the back of the ink reservoir of each nozzle 1
The crystal vibrates when it receives a tiny electric charge 1
Ink is forced out of the nozzle by the inward vibration 1
The outward vibration creates a partial vacuum in the nozzle 1
Replacement ink is pulled into the reservoir 1

2(b)(ii) Two from: Max 2


The (print head) stepper motor is connected to the print head by a belt 1
The (print head) stepper motor moves the print head across the paper 1
The (parking) stepper motor parks the print head assembly when not
in use 1
The (paper feed)stepper motor turns the rollers that provide the paper feed
// The (paper feed)stepper motor moves the paper in small increments 1

2(c)(i) Two from: Max 2


External hard drive // External HDD 1
External flash drive // External SSD 1
Pen drive 1

© UCLES 2017 Page 3 of 7


MUHAMMAD ALI KHAN
PAGE 242
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

2(c)(ii) One from: Max 1


(External) Hard drive
Inexpensive per unit of storage 1
Larger storage capacity than flash drive 1
Or:
Pen drive // (External) flash drive
No moving parts / noise 1
Low latency // fast access times 1
Robust 1

Question Answer Marks

3(a) Definition: Max two from: Max 3


The number of distinct values available to encode/represent each
sample 1
Specified by the number of bits used to encode the data for one
sample 1
Sometimes referred to as bit depth 1

Explanation: Max two from:


A larger sampling resolution will mean there are more values available to
store each sample 1
A larger sampling resolution will improve the accuracy of the digitised sound
// A larger sampling resolution will decrease the distortion of the sound 1
Increased sampling resolution means a smaller quantization error 1

3(b)(i) One from: 1


The number of pixels per unit measurement 1
The number of pixels in an image 1
The number of pixels wide by the number of pixels high 1
Number of pixels per row by the number of rows 1

3(b)(ii) 4 1

3(b)(iii) Working: Max two from: 3


Number of pixels is 8192 256 1
One pixel will be stored as one byte 1
Number of kilobytes = (8192 256) / 1024 1
Answer: One mark:
Number of kilobytes = 2048 KB 1

3(b)(iv) Two from: Max 2


Confirmation that the file is a BMP 1
File size 1
Location/offset of image data within the file 1
Dimensions of the image (in pixels) // image resolution 1
Colour depth (bits per pixel, 1, 4, 8, 16, 24 or 32) 1
Type of compression used, if any 1

© UCLES 2017 Page 4 of 7


MUHAMMAD ALI KHAN
PAGE 243
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

4(a)(i) Two from: 2


The hardware is unusable without an OS // hides complexity of hardware
from user 1
Acts as an interface/ controls communications between user and hardware /
hardware and software // or by example 1
Provides software platform / environment on which other programs can be
run 1

4(a)(ii) One mark for the name and one mark for description. Max 4
Max two management tasks.

Provides the Human Computer Interface (HCI) 1


Controls communications between user and hardware// or by example 1

Main memory management 1


Memory protection to ensure that two programs do not try to use the same
space // Use of virtual memory // Location of processes within the memory // By
example 1

File / Secondary storage management 1


Maintains directory structures // Provides file naming conventions // Controls
access 1

Peripheral / hardware / device / Input-Output management 1


Installation of appropriate driver software // Controls access to data being sent
to/from hardware/peripherals // Controls access to hardware/peripherals //
manages communication between devices. 1

Interrupt handling 1
Identifies priorities of interrupts // Saves data on power outage // Loads
appropriate Interrupt Service Routine (ISR) // By example 1

Security management 1
Makes provision for recovery when data is lost // Provides usernames and
passwords // Prevents unauthorised access // Ensures privacy of data 1

4(b)(i) File compression software 1

4(b)(ii) Backup software 1

4(b)(iii) Disk defragmenting software 1

4(b)(iv) Anti-virus software 1

Question Answer Marks

5(a)(i) 351 1

5(a)(ii) 355 1

5(a)(iii) 22 1

© UCLES 2017 Page 5 of 7


MUHAMMAD ALI KHAN
PAGE 244
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

5(a)(iv) 86 1

5(b) Op code Operand 3

0 0 0 1 0 0 1 0 0 1 0 0 0 0 1 1

0 0 0 1 0 1 0 1 0 0 0 0 0 1 1 1

Both correct op codes 1


Operand 0100 0011 1
Operand 0000 0111 1

5(c)(i) 14 5E 2

14 1
5E 1

5(c)(ii) LDR #77 2

LDR 1
#77 1

© UCLES 2017 Page 6 of 7


MUHAMMAD ALI KHAN
PAGE 245
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

6(a) Two from: Max 2


The file is made available from a web/email/FTP server 1
The user’s browser is the client software 1
The client (software browser) requests the file from the server 1
The desired file is returned to the client computer 1

6(b) 1. The user keys in the Uniform Resource Locator (URL) into 4
the browser Software.
2. E // The Domain Name Service (DNS) uses the domain 1
name from the browser to look up the IP address of the web
server.
3. D // The web server retrieves the page 1
4. F // Sends the web page content to the browser 1
5. B // Browser software renders the page and displays 1

6(c)(i) Output1, Output2 1 2


RunnerID // Runner ID 1

6(c)(ii) 6 – 21 1

6(c)(iii) 13 1

6(c)(iv) Checks that the RunnerID entered starts with the characters CAM or VAR only 1

6(c)(v) Two checks from: Max 4


One mark for check and one mark for description

Format check 1
RunnerID is three letter characters followed by two digit characters
//Position is digit characters only 1

Length check 1
RunnerID has exactly five characters 1

Range check 1
The value for Position is between1 and (say) 50 1

Presence check 1
The text box for RunnerID or Position is not empty 1

Existence check 1
To ensure that RunnerID has been registered 1

Uniqueness check 1
To ensure no two runners have the same number 1

© UCLES 2017 Page 7 of 7


PAGE 246

MUHAMMAD ALI KHAN


PAGE 247

MUHAMMAD ALI KHAN


PAGE 248

MUHAMMAD ALI KHAN


PAGE 249

MUHAMMAD ALI KHAN


PAGE 250

MUHAMMAD ALI KHAN


PAGE 251

MUHAMMAD ALI KHAN


PAGE 252

MUHAMMAD ALI KHAN


PAGE 253

MUHAMMAD ALI KHAN


PAGE 254

MUHAMMAD ALI KHAN


PAGE 255

MUHAMMAD ALI KHAN


PAGE 256

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 257

Cambridge International Examinations


Cambridge International Advanced Subsidiary and Advanced Level

COMPUTER SCIENCE 9608/13


Paper 1 Written Paper May/June 2017
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This document consists of 8 printed pages.

© UCLES 2017 [Turn over


MUHAMMAD ALI KHAN
PAGE 258
9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

1(a) Many-to-one 1

1(b)(i) A-NURSE(NurseID, FirstName, FamilyName, WardName) 1

1(b)(ii) The primary key WardName in the A-WARD table 1 2


links to the foreign key WardName in the A-NURSE table. 1

1(c)(i) Many-to-many relationship 1

1(c)(ii) B-WARD-NURSE(WardName, NurseID) 2

Both attributes (with no additions) 1


Joint primary key correctly underlined 1

1(c)(iii) 2
B-NURSE B-WARD

B-WARD-NURSE

Correct relationship between B-NURSE and B-WARD-NURSE 1


Correct relationship between B-WARD and B-WARD-NURSE 1

1(d)(i) SELECT NurseID, FamilyName 1 3


FROM B-NURSE 1
WHERE Specialism = 'THEATRE'; 1

1(d)(ii) UPDATE B-NURSE 1 3


SET FamilyName = 'Chi' 1
WHERE NurseID = '076'; 1

© UCLES 2017 Page 2 of 8


MUHAMMAD ALI KHAN
PAGE 259
9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

2(a)(i) A laser beam and a rotating mirror are used to draw an 3


1
image of the page on the photosensitive drum.
C // The image is converted on the drum into an
2
electrostatic charge.
3 Electrostatic charge attracts toner.
4 The charged paper is rolled against the drum.
D // The oppositely-charged paper picks up the toner
5 particles from the drum. After picking up the toner, the
paper is discharged to stop it clinging to the drum.
A // The paper passes through a fuser, which heats up
6 the paper. The toner melts and forms a permanent
image on the paper.
B // The electrical charge is removed from the drum and
7
the excess toner is collected.

C in the correct place 1


DA, 1
AB 1

2(a)(ii) Inkjet printer 1

2(b) Hard disk drive // HDD 1 3


Solid state drive //SSD // flash memory 1
One from:
Hard disk
Inexpensive per unit of storage 1
Larger storage capacity than flash drive 1

Solid state storage


No moving parts / noise 1
Robust 1
Low latency // Fast read/write time 1

© UCLES 2017 Page 3 of 8


MUHAMMAD ALI KHAN
PAGE 260
9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

3(a) Sampling rate 2


The number of samples taken per unit time // the number of times the amplitude is
measured per unit time 1
Increasing the sampling rate will increase the accuracy / precision of the digitised
sound // Increasing the sampling rate will result in smaller quantisation errors. 1

3(b)(i) Pixel 2
Smallest picture element which can be drawn 1
Screen resolution
The number of pixels which can be viewed horizontally and vertically on the screen //
or by example - A typical screen resolution is 1680 pixels 1080 pixels. 1

3(b)(ii) 8 1

3(b)(iii) Working: Max two from: 3


Number of pixels is 2048 512 1
One pixel will be stored as one byte 1
Number of kilobytes = (2048 512) / 1024 1
Answer: One mark:
Number of kilobytes = 1024 KB 1

3(b)(iv) One from: 1

Confirmation that the file is a BMP 1


File size 1
Location/offset of image data within the file 1
Dimensions of the image in pixels // image resolution 1
Colour depth (bits per pixel) 1
Type of compression used, if any 1

© UCLES 2017 Page 4 of 8


MUHAMMAD ALI KHAN
PAGE 261
9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

4(a)(i) 500 1

4(a)(ii) 496 1

4(a)(iii) 502 1

4(a)(iv) 86 1

4(b) 3
0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 1

0 0 0 0 0 1 1 0 0 1 1 0 0 0 0 1

Both correct op codes 1


Operand 0001 0001 1
Operand 0110 0001 1

4(c) 256 1

4(d)(i) 07 C2 2

07 1
C2 1

4(d)(ii) LDI 63 2

LDI 1
63 1

© UCLES 2017 Page 5 of 8


MUHAMMAD ALI KHAN
PAGE 262
9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

5(a)(i) Count the number of one bits in the first seven bit positions 1 2
Add a 0 or 1 to bit position 0, to make the count of one bits an odd number 1

5(a)(ii) A=1 1
B=1

5(a)(iii) Two from: 2

A parity bit is worked out for each column 1


The computer checks the parity of each bit position in parity byte // the computer
generates copy of the parity byte and compares 1
If incorrect parity then there is an error in the data received // No parity error
means no error in the data received 1
The position of the incorrect bit can be determined 1

5(b)(i) 2

5(b)(ii) Three from: 3

Consider each row in sequence 1


Identify any row with incorrect parity 1
Repeat the process for each column in sequence 1
Identify where a row and column with incorrect parity intersect 1

© UCLES 2017 Page 6 of 8


MUHAMMAD ALI KHAN
PAGE 263
9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

6(a) 3

The user closes the Spreadsheet


program

The user selects the Save


command to save their
spreadsheet file

The user selects the Print


command to output their
spreadsheet file

One mark for each correct line from each left hand box to max three marks.

6(b)(i) File compression software 1

6(b)(ii) Backup software 1

6(b)(iii) Disk repair software 1

6(b)(iv) Anti-virus software 1

© UCLES 2017 Page 7 of 8


MUHAMMAD ALI KHAN
PAGE 264
9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

7(a) Two from: 2


The user’s web browser is the client software 1
The requested web page has program code / script embedded within it 1
This code is interpreted by the web browser 1

7(b) Four from: Max 4


The browser parses the URL to obtain the Domain Name 1
The browser software passes the Domain Name to the nearest Domain Name
Server (DNS) 1
The DNS stores a list of Domain Names and matching IP addresses 1
The DNS Name Resolver looks for the Domain Name in its database 1
If found the corresponding IP address is returned to the originator 1
If not found the request is forwarded to another higher level DNS 1
The original DNS adds the returned IP address to its cache 1
The original DNS returns the IP address to the originator 1
The browser uses the IP address to request the required web page from the web
server 1
The web server retrieves the page and delivers it to the originator 1
The browser software interprets the script and displays the web page 1

7(c)(i) Message1, Message2 1 2


x 1

7(c)(ii) 6 – 19 1

7(c)(iii) 11 1

7(c)(iv) Checks that the product code has not be left blank // presence check on product 1
code

7(c)(v) Two checks from: Max 4


One mark for check and one mark for description

Range check 1
Check the number entered is (say) between 1 and 100 1

Format check 1
Checks the product code is a particular format // Checks the number has digit
characters only // by example 1

Length check 1
The number of items has exactly five characters 1

Existence check 1
To ensure the product code has been assigned 1

© UCLES 2017 Page 8 of 8


PAGE 265

MUHAMMAD ALI KHAN


PAGE 266

MUHAMMAD ALI KHAN


PAGE 267

MUHAMMAD ALI KHAN


PAGE 268

MUHAMMAD ALI KHAN


PAGE 269

MUHAMMAD ALI KHAN


PAGE 270

MUHAMMAD ALI KHAN


PAGE 271

MUHAMMAD ALI KHAN


PAGE 272

MUHAMMAD ALI KHAN


PAGE 273

MUHAMMAD ALI KHAN


PAGE 274

MUHAMMAD ALI KHAN


PAGE 275

MUHAMMAD ALI KHAN


PAGE 276

MUHAMMAD ALI KHAN


PAGE 277

MUHAMMAD ALI KHAN


PAGE 278

MUHAMMAD ALI KHAN


PAGE 279

MUHAMMAD ALI KHAN


PAGE 280

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 281

Cambridge Assessment International Education


Cambridge International Advanced Subsidiary and Advanced Level

COMPUTER SCIENCE 9608/11


Paper 1 Written Paper October/November 2017
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2017 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This document consists of 7 printed pages.

© UCLES 2017 [Turn over


MUHAMMAD ALI KHAN
PAGE 282
9608/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

1(a)(i) 119 1

1(a)(ii) –120 1

1(a)(iii) 1 1 1 0 1 1 1 1 1

1(a)(iv) Lowest value: 128 1


Highest value: +127

1(b)(i) 0110 0101 0011 1

1(b)(ii) The second block of four binary digits represents a digit larger than 9 // 14 1

1(b)(iii) A string of digits on any electronic device displaying numeric values 1

Question Answer Marks

2(a) 4

2(b)(i) One mark from: 1

The program code can be translated to run on any processor / platform


Source code is translated into machine independent intermediate code not
machine dependent code

© UCLES 2017 Page 2 of 7


MUHAMMAD ALI KHAN
PAGE 283
9608/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

2(b)(ii) Two marks from: Max 2

Java uses a two-step translation process


Java code is partially interpreted – partially compiled
Code is translated first into intermediate code / "bytecode"
using the Java compiler
The bytecode is finally interpreted by the Java Virtual Machine

Question Answer Marks

3(a) Two marks from: Max 2

Physical measures
Access rights
Encryption
Firewall
Use authentication methods such as usernames and passwords
Anti-malware program

3(b)(i) 4
7 X 6 = 42
8 X 5 = 40
6 X 4 = 24 1 mark for 6 values
5 X 3 = 15
3 X 2 = 6
1 X 1 = 1
Total: 128 / 11
11 R 7 1 mark for 2 steps
Accept 128 MOD 11 = 7
Check digit: 11 – 7 = 4 1 mark for subtraction

Answer: 786531 4 (1 mark for answer)

3(b)(ii) One mark for name of check Max 4


One mark for description
Max two checks

Uniqueness check
Each PatientID must be unique

Length check
Each PatientID is exactly 7 characters

Format check / Type check


All 7 characters must be digits

Presence check
PatientID must be entered

© UCLES 2017 Page 3 of 7


MUHAMMAD ALI KHAN
PAGE 284
9608/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

4(a) A – System clock 5


B – Control unit
C – Main memory
E – Control bus
F – Data bus

4(b) ACC CountDown OUTPUT 5


15
67 C
15
14 14 (1)
51 3 (1) + (1)
14 (1)
13 13
32 (1)
88 X

4(c) Three marks from: Max 3

The assembler scans the assembly language instructions in sequence


When it meets a symbolic address checks to see if already in symbol table
If not, it adds it to the symbol table in the symbolic address column
If it is already in symbol table check if absolute address known
If the absolute address is known, it is entered in the appropriate cell
If the absolute address is not known mark / leave as unknown

4(d)(i) The op code / mnemonic / instruction table 1

4(d)(ii) A – 1110 0110 0110 1000 3


(1) (1)

B – E6 68 (1)

© UCLES 2017 Page 4 of 7


MUHAMMAD ALI KHAN
PAGE 285
9608/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

5(a)(i) Three marks from: 3

Diaphragm / cone
(Voice) coil of wire
Spider / Suspension
(Permanent) Magnet
Basket
Dust cap
Outer frame

5(a)(ii) Four marks from: Max 4

Takes an electrical signal and translates it into physical vibrations to create


sound waves
An electric current in the coil creates an electro-magnetic field
Changes in the audio signal causes the direction of the electric current to
change
The direction of the current determines the polarity of the electro-magnet //
changing the direction of the current changes the direction of the polarity of the
electro-magnet
The electro-magnet is repelled by or attracted to the permanent magnet
Causing the coil to vibrate
The movement of the coil causes the cone / diaphragm to vibrate
That vibration is transmitted to the air in front of the cone / diaphragm as sound
waves
The amount of movement will determine the frequency and amplitude of the
sound wave produced

5(b)(i) One mark from: 1

External hard disk drive // SSD


External CD / DVD drive
Pen drive
Blu-ray drive

5(b)(ii) Two marks from: Max 2

Additional secondary file storage // storing files


Backup of files
Archiving of files
Transfer files to second computer

© UCLES 2017 Page 5 of 7


MUHAMMAD ALI KHAN
PAGE 286
9608/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

6(a) Two marks from: Max 2

A system of moral principles


That guide behaviour / decision making
Based on philosophical / religious views
By example, e.g. respectful and considerate behaviour

6(b) One mark for identifying the issue Max 6


One mark for correct principle
One mark for possible action
Max 2 issues (2 × 3 marks)

1 Uncomfortable with one of his colleagues


Client and Employer // Management / Colleagues // Judgement // Self
For example: Team building exercises // arranged meeting

2 Unfamiliar with programming language


Self // Client and Employer //Product // Profession // Colleagues
For example: Undergo training

3 Visit to unfamiliar workplace


Client and employer // Management // Judgement // Profession // Colleagues
For example: He should speak to his manager to discuss situation

Question Answer Marks

7(a)(i) PatientID 2
(1)
DoctorID

AppointmentDate, AppointmentTime (1)

7(a)(ii) 2

One PATIENT attends many APPOINTMENTs


One DOCTOR takes many APPOINTMENTs

Special case for 1 mark only (only if no one to many relationships shown)
Many PATIENTs are seen by many DOCTORs

© UCLES 2017 Page 6 of 7


MUHAMMAD ALI KHAN
PAGE 287
9608/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

7(b) Two marks from: 2


Either:
Add an attribute (for example Attended )
To the appointment table // APPOINTMENT
Or:
Add an attribute (for example AppointmentsMissed )
To the patient table // PATIENT

7(c)(i) Available to work at both SITE-A and SITE-B 1

7(c)(ii) APPOINTMENT(Site, AppointmentDate, AppointmentTime, 1


DoctorID, PatientID)

7(d)(i) One mark per line 3

UPDATE DOCTOR
SET DoctorID = '017'
WHERE DoctorID = '117';

7(d)(ii) 1 Mark per bullet, max 2 Max 2

Referential integrity should be maintained // Referential integrity could be


violated.
Data becomes inconsistent
There may be records in the APPOINTMENT table showing doctor ID 117
The APPOINTMENT table might not be automatically updated
Records in the APPOINTMENT table will become orphaned

7(e) One mark per line 3

SELECT AppointmentDate, AppointmentTime


FROM APPOINTMENT
WHERE PatientID = '556';

© UCLES 2017 Page 7 of 7


PAGE 288

MUHAMMAD ALI KHAN


PAGE 289

MUHAMMAD ALI KHAN


PAGE 290

MUHAMMAD ALI KHAN


PAGE 291

MUHAMMAD ALI KHAN


PAGE 292

MUHAMMAD ALI KHAN


PAGE 293

MUHAMMAD ALI KHAN


PAGE 294

MUHAMMAD ALI KHAN


PAGE 295

MUHAMMAD ALI KHAN


PAGE 296

MUHAMMAD ALI KHAN


PAGE 297

MUHAMMAD ALI KHAN


PAGE 298

MUHAMMAD ALI KHAN


PAGE 299

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 300

Cambridge Assessment International Education


Cambridge International Advanced Subsidiary and Advanced Level

COMPUTER SCIENCE 9608/12


Paper 1 Written Paper October/November 2017
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2017 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This document consists of 12 printed pages.

© UCLES 2017 [Turn over


MUHAMMAD ALI KHAN
PAGE 301
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

1 1 Mark for stating the management task 6


1 Mark for a corresponding description
Maximum 2 marks for each task
Maximum 3 tasks

Process / Task Management


Allocation of processor time
Scheduling of processes or tasks / multi-tasking / multi-programming etc.
By example – e.g. round-robin, shortest remaining time first etc.
Resolution of conflict when two or more processes require the same resource

Secondary Storage management


Storage space divided into file allocation units
Space allocated to particular files
OS maintains a file directory and FAT
Provides file naming conventions
Controls access.

Peripheral / Hardware / Device / Input/output Management


Installation of appropriate driver software
Controls access to data being sent to/from hardware/peripherals
Controls access to hardware/peripherals
Manages communication between devices / hardware and software

Provision of a User interface


Allows user interaction with the computer system// Facilitates human computer
communication
Hides the complexity of the hardware from the user
Or by example – e.g. GUI, command line etc.

Interrupt Handling
Halts the execution of the current process
Stores the values of the current process on the stack
Loads and executes the appropriate ISR code
Use of priorities for handling simultaneous interrupts
Saves data on power outage

Security Management
Makes provision for recovery when data is lost
Provides usernames and passwords / encryption / user accounts
Prevents unauthorised access
Ensures privacy of data

Provision of a software platform / environment


On which other programs / applications can be run

© UCLES 2017 Page 2 of 12


MUHAMMAD ALI KHAN
PAGE 302
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

2(a) 1 Mark for each correct connection 4

2(b)(i) 1 Mark per bullet, max 2 2

Once translated the compiler software is not needed to run the program
Compiled code should execute faster
Compiler produces an executable file
The executable file produced by a compiler can be distributed without users
having sight of the source code // source code is kept secure // users are unable
to make changes to the program
Cross-compilation is possible

2(b)(ii) 1 Mark per bullet, max 2 2

Easier de-bugging
The interpreter stops when error encountered
error can be corrected in real time
The interpreter translates a statement then executes it immediately
Parts of the program can be tested, without all the program code being available.

© UCLES 2017 Page 3 of 12


MUHAMMAD ALI KHAN
PAGE 303
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

3(a)(i) 1 Mark per bullet, max 3 3


Security is keeping the data safe
From accidental / malicious damage /loss
By example of need for security

Privacy is the need to restrict access to personal data


To avoid it being seen by unauthorised people
By example of need for privacy

3(a)(ii) 1 Mark for a suitable example 1


For example: Personal data of students / staff

3(b) 1 Mark for stating the security measure 4


1 Mark for a corresponding description
Maximum 2 marks for each measure
Maximum 2 measures

Physical measures
Locked doors/keyboards etc.
Secure methods of access, keypads/ biometric scans etc.

Backup of data
Regular copies of the data are made
If the data is corrupted it can be restored

Disk-mirroring
All activity is duplicated to a second disk in real time so that if the first disk fails
there is a complete copy available

Access rights
Different access rights for individuals/groups of users
To stop users editing data they are not permitted to access
By example

Encryption
If accessed, data cannot be understood by unauthorised personnel
Accessed only by those with the decryption key

Firewall
To stop unauthorised access/hackers gaining access to the computer network

Use authentication methods such as passwords and usernames


Passwords should be strong / biometrics
To prevent unauthorised access to data

Anti-malware program
To detect / remove / quarantine viruses / key-loggers etc.
Carrying out regular scans

Concurrent Access Controls // Record locking


Closes a record to second user until first update complete
To prevent simultaneous updates being lost

© UCLES 2017 Page 4 of 12


MUHAMMAD ALI KHAN
PAGE 304
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

3(c) 1 Mark per bullet, max 2 2

Checking that the data entered matches / is consistent with that of the source.
Comparison of two versions of the data
Examples include double entry, visual checking, proof reading etc...
In the event of a mismatch – the user is forced to re-enter the data
By example, e.g. creation of a password
Does not check data is sensible/acceptable

© UCLES 2017 Page 5 of 12


MUHAMMAD ALI KHAN
PAGE 305
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

4(a) 1 Mark for each correct answer 5


A – General purpose registers
B – System clock
C – ALU
E – Control bus
F – Address bus

4(b) 1 Mark per bullet, max 2 2


The clock sends out a number of pulses in a given time interval (clock speed)
Each processor instruction takes a certain number of clock cycles to execute
The higher the clock frequency, the shorter the execution time for the instruction
// Increasing the clock frequency improves performance

4(c)(i) 1 Mark per bullet 3


Maximum 2 for Macro
Maximum 2 for Directive
Maximum 3 in total

Macro
A group of instructions given a name // subroutine
A group of instructions that need to be executed several times within the same
program
The statements are written once and called using the name whenever they need
to be executed
Macro code is inserted into the source file at each place it is called
By example

Directive
An instruction that directs the assembler to do something
A directive is not a program instruction
It is information for the assembler
By example

4(c)(ii) 1 Mark for a suitable example 1

For example: State the start address for the program //tell the assembler to set aside
space for variables // include an external file etc.

© UCLES 2017 Page 6 of 12


MUHAMMAD ALI KHAN
PAGE 306
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

4(d) Mark as shown 5

ACC Offset OUTPUT


10
50 2
10
11 11 1 Mark for these two values, as first instructions
65 1 Mark for this value, in any row
A 1 Mark for this value, in any row
11 1 Mark for this value, after 65, nothing in between
12 12 1 Mark for the rest
89 Y
12
13 13
32

© UCLES 2017 Page 7 of 12


MUHAMMAD ALI KHAN
PAGE 307
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

4(e) Mark as follows: 6

Table entries:
1 Mark per bullet, max 4
EndProg
2 Unknown
9
14
8

Numbering:
1 Mark per bullet, max 2

Relative address of Value is numbered 6


Number given for EndProg is next number in sequence to relative address of
Value
All numbers correct – award 2 marks

7 9

© UCLES 2017 Page 8 of 12


MUHAMMAD ALI KHAN
PAGE 308
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

5
Public

Incident A Client & Employer

Incident B Product
Ethical

Incident C Judgement

Incident D Management
Unethical
Incident E Profession

Incident F Colleagues

Self

5(a) Mark as follows: 2


Unethical: C and E 1 Mark
Ethical: A,B, D and F 1 Mark

5(b) Mark as follows: 4


A – Public interest 1 Mark
B – Self 1 Mark
D – Profession 1 Mark
F – Product 1 Mark

© UCLES 2017 Page 9 of 12


MUHAMMAD ALI KHAN
PAGE 309
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

6(a) 1 mark for each correct row 3

Application Input device Output device


Capture the text from a paper
Flatbed scanner /
document, in order that the text
Digital camera
can be word-processed
Producing a replica of a small
plastic component from a washing 3D Printer
machine
A museum has interactive Touch screen /
Touch screen /
information facilities throughout touch pad /
speakers etc.
the building microphone etc.

6(b) 1 Mark per bullet to max 4 4

The hard disk has one or more platters made of aluminium or glass
Each surface of the platter/disk is ferrous-oxide which is capable of being
magnetised
The platters/disks are mounted on a central spindle
The disks are rotated at high-speed
Each surface of the disk has a read/write head mounted on an arm positioned
just above the surface
Electronic circuits control the movement of the arm and hence the heads
The surface of the platter/disk is divided into concentric tracks and sectors
One track in one sector is the basic unit of storage called a block
The data is encoded as a magnetic pattern for each block
When writing to disk, a variation in the current in the head produces a variation
in magnetic field on the disk
When reading from disk, a variation in magnetic field produces a variation in
current through the head

© UCLES 2017 Page 10 of 12


MUHAMMAD ALI KHAN
PAGE 310
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

7(a)(i) 1 Mark for correct primary key identified in both STAFF and CLIENT 3
STAFF(StaffID, StaffName, Department)
CLIENT(ClientName, Address, Town)

1 Mark for correct primary key identified in VISIT


VISIT(ClientName, VisitDate)

1 Mark for correct primary key identified in INTERVIEW


INTERVIEW(ClientName, VisitDate, StaffID, SpecialistFocus,
InterviewText)

7(a)(ii) 1 Mark for each correct relationship 3

CLIENT VISIT

VISIT INTERVIEW

INTERVIEW STAFF

7(b) 1 Mark for correct answer 1

Add attribute VisitReportText to table VISIT

7(c)(i) 1 Mark for each correct line 3

UPDATE CLIENT
SET ClientName = 'Albright Holdings'
WHERE ClientName = 'ABC Holdings';

7(c)(ii) 1 Mark per bullet, max 2 2

Referential integrity should be maintained // Referential integrity could be


violated

Data becomes inconsistent

There may be records in the VISIT and INTERVIEW tables / other tables with
client name ABC Holdings

The ClientName in the VISIT and INTERVIEW tables / other tables might not
be automatically updated

Records in the VISIT and INTERVIEW tables / other tables will become
orphaned

© UCLES 2017 Page 11 of 12


MUHAMMAD ALI KHAN
PAGE 311
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

7(d) 1 Mark for each correct line 3

SELECT StaffID FROM INTERVIEW


WHERE ClientName = 'New Age Toys'
AND VisitDate = '13/10/2016'; (Accept clauses other way round)

7(e) 1 Mark for a correct answer 1


Add a suitable attribute, for example, EuropeTraveller to the STAFF table // Add
a suitable attribute, for example, Country to the CLIENT table

© UCLES 2017 Page 12 of 12


PAGE 312

MUHAMMAD ALI KHAN


PAGE 313

MUHAMMAD ALI KHAN


PAGE 314

MUHAMMAD ALI KHAN


PAGE 315

MUHAMMAD ALI KHAN


PAGE 316

MUHAMMAD ALI KHAN


PAGE 317

MUHAMMAD ALI KHAN


PAGE 318

MUHAMMAD ALI KHAN


PAGE 319

MUHAMMAD ALI KHAN


PAGE 320

MUHAMMAD ALI KHAN


PAGE 321

MUHAMMAD ALI KHAN


PAGE 322

MUHAMMAD ALI KHAN


PAGE 323

MUHAMMAD ALI KHAN


PAGE 324

MUHAMMAD ALI KHAN


PAGE 325

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 326

Cambridge Assessment International Education


Cambridge International Advanced Subsidiary and Advanced Level

COMPUTER SCIENCE 9608/11


Paper 1 Written Paper May/June 2018
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.

IGCSE™ is a registered trademark.

This document consists of 9 printed pages.

© UCLES 2018 [Turn over


MUHAMMAD ALI KHAN
PAGE 327
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2018 Page 2 of 9


MUHAMMAD ALI KHAN
PAGE 328
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

1 1 mark for a correct line from each communication media, max 6 6

Fibre-optic Can be twisted pair or co-axial


cable
Transmits light pulses

Radio
waves Large range of wavelengths

Least likely to have


Copper interference
cable
Wireless transmission

Satellite

Question Answer Marks

2(a) 1 mark per bullet, max 2 2


Made up of pixels
Each pixel has one colour
Colour of each pixel stored as a binary number

2(b)(i) 1 mark per bullet, max 2 2


Each pixel requires only one bit (as there are only two colours)
Black represented by 1 and white by 0 (or vice versa)
Bits are stored for each pixel in sequence
11111 01010 01010 01010 01010

2(b)(ii) 1 mark for the explanation 2


Stores the colour and the number of times it occurs

1 mark for example from


An example from the bitmap given e.g. B5, W1, B1 and so on

2(c) 1 mark per bullet 4


Number of pixels 500*1000 (= 500 000)
35 colours require 6 bits per pixel
Number of bytes (500 000 * 6) / 8 = 3 000 000 / 8 (= 375 000)
= 375 Kb

© UCLES 2018 Page 3 of 9


MUHAMMAD ALI KHAN
PAGE 329
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

2(d) 1 mark per bullet to max 2 marks per benefit 4


Can resize it without pixilation
Image is redrawn/recalculated with each adjustment
Smaller file size
Storing points/equations/commands etc., not individual pixels

Question Answer Marks

3(a)(i) 1 mark per bullet to max 3 3


Allocates / deallocates RAM to programs/tasks/processes
Keeps track of allocated and free memory locations
Swaps data to and from the hard drive
Handles virtual memory
Paging // segmentation
Memory protection, preventing a process accessing memory not
allocated to it

3(a)(ii) 1 mark per bullet to max 3 3


Sets up user accounts
Checks usernames, passwords // Authentication
Implements access rights
Automatic backup
System restore / roll back (to previous stable state)

3(a)(iii) 1 mark per bullet to max 2 2


Device / peripheral management
File management
Process management
Input / output management
Error detection / recovery
Provides a user interface
Facilitates communication between hardware and software / hardware
devices

3(b) 1 mark for each correct box ticked 4

Programs True False


Disk Defragmenter
Word Processor
Library program
Compression Software

© UCLES 2018 Page 4 of 9


MUHAMMAD ALI KHAN
PAGE 330
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

4(a) 1 mark per bullet:


A OR B 3
C OR D OR E
Final AND

4(b) 1 mark for each correct pair of rows 4

A B C Working space X

0 0 0 0

0 0 1 1

0 1 0 1

0 1 1 0

1 0 0 1

1 0 1 1

1 1 0 1

1 1 1 1

© UCLES 2018 Page 5 of 9


MUHAMMAD ALI KHAN
PAGE 331
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

5(a) 1 mark per server 2


e.g.
E-mail
Print
Web

5(b) 1 mark for the indicating the statement is false: 5

True False

1 mark per bullet for justification to max 4.


Internet is the infrastructure / global collection of networks
World Wide Web is the (multimedia web) pages / content
The World Wide Web is accessed over the Internet
Webpages are written in HTML
HTTP protocol used to transfer web pages
Internet uses IP protocol

5(c) 1 mark per bullet to max 4 4


The browser requests the web page
The web server accesses the page
The web server processes / executes the code
The web server produces the HTML for the web page / generates the
web page
The web server returns the web page to the client
The client browser displays this web page

Question Answer Marks

6(a) 1 mark for the correct parity 1

Parity bit
0 0 1 0 0 0 0 0

© UCLES 2018 Page 6 of 9


MUHAMMAD ALI KHAN
PAGE 332
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

6(b)(i) 1 mark for the correct bit circled 1

Parity
Data
bit
1 1 0 1 0 1 1 1

1 0 0 0 1 1 1 0

0 1 0 0 1 0 1 1

1 1 1 0 1 1 1 1
Parity 1 1 1 1 1 0 0 1
byte

6(b)(ii) 1 mark for each bullet point 2


row and column has incorrect parity (odd instead of even)
the intersection identifies the error

6(c) 1 mark per bullet to max 2 2


Errors in an even number of bits (in the same row or column)
Prevents error being identified
Could appear to be correct

6(d) 1 mark for the name and max 2 marks for description 3
Check sum
A calculation is done on a block of data
The result is transmitted with the data
Calculation repeated at receiving end
Results compared
If different an error has occurred

Hash total
Total of several fields of data
Including fields not usually used in calculations
The result is transmitted with the data
Calculation repeated at receiving end
Results compared
If different an error has occurred

© UCLES 2018 Page 7 of 9


MUHAMMAD ALI KHAN
PAGE 333
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

7(a) 1 mark for each input device to max 2 3


e.g.
(Handheld) remote controller
Joystick / Games pad / joypad
Accelerometer
Microphone
Suitable sensor

1 mark for output


e.g.
Motor/vibrator in joystick
Speaker
Screen/monitor /TV

7(b)(i) 1 mark for each difference to max 2 2


RAM is volatile and ROM is non-volatile
RAM can change and ROM (usually) can't be changed
ROM is read only, RAM is read/write

7(b)(ii) 1 mark for example 1


e.g.
Current game
Currently running processes
Current graphics/sound

7(b)(iii) 1 mark for an example 1


e.g.
Start-up instructions / boot program
Kernel of Operating System

Question Answer Marks

8(a) 1 mark per bullet to max 2 2


Small piece / word of (fast) memory
Part of the processor
Temporary storage of data
Data is about to be / has been processed

8(b)(i) 1 mark per bullet to max 2 2


Stores / holds data / instruction when fetched from memory
Stores / holds data which is being written to memory
The location accessed is the address held in the Memory Address
Register (MAR)

© UCLES 2018 Page 8 of 9


MUHAMMAD ALI KHAN
PAGE 334
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

8(b)(ii) 1 mark per bullet to max 2 2


Current Instruction Register (CIR)
Memory Address Register (MAR)
Program Counter (PC)
Accumulator (ACC)
Index Register (IX)
Status Register
Interrupt Register

8(c)(i) 135 1

8(c)(ii) 87 1

8(c)(iii) –121 1

© UCLES 2018 Page 9 of 9


PAGE 335

MUHAMMAD ALI KHAN


PAGE 336

MUHAMMAD ALI KHAN


PAGE 337

MUHAMMAD ALI KHAN


PAGE 338

MUHAMMAD ALI KHAN


PAGE 339

MUHAMMAD ALI KHAN


PAGE 340

MUHAMMAD ALI KHAN


PAGE 341

MUHAMMAD ALI KHAN


PAGE 342

MUHAMMAD ALI KHAN


PAGE 343

MUHAMMAD ALI KHAN


PAGE 344

MUHAMMAD ALI KHAN


PAGE 345

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 346

Cambridge Assessment International Education


Cambridge International Advanced Subsidiary and Advanced Level

COMPUTER SCIENCE 9608/12


Paper 1 Written Paper May/June 2018
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.

IGCSE™ is a registered trademark.

This document consists of 9 printed pages.

© UCLES 2018 [Turn over


MUHAMMAD ALI KHAN
PAGE 347
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2018 Page 2 of 9


MUHAMMAD ALI KHAN
PAGE 348
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

1(a)(i) 1 mark per bullet to max 3 3


Storage space divided into file allocation units
Space allocated to particular files
Maintains/creates directory structures
Specifies the logical method of file storage (e.g. FAT or NTFS)
Provides file naming conventions
Controls access // implements access rights // implements password
protection // Makes file sharing possible
Specifies tasks that can be performed on a file (e.g. open, close,
delete, copy, create, move etc.)

1(a)(ii) 1 mark per bullet to max 3 3


Installs printer driver
Sends data to the printer / buffer to print // sends documents to the
print queue
Sends commands to printer
Receives and handles (error) messages/signals/interrupts from the
printer

1(b)(i) 1 mark for each correct box ticked. 4

Program True False


Database
Virus checker
Web browser
Backup software

1(b)(ii) 1 mark for each valid utility program to max 2 2


e.g.
System clean up
Automatic update
Disk contents analysis / Disk checking / Disk repair
File compression
Disk formatter
Firewall
Disk Defragmenter

© UCLES 2018 Page 3 of 9


MUHAMMAD ALI KHAN
PAGE 349
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

2(a) 1 mark for each gate with the correct inputs. 6


Final two gates must also have the correct output.

2(b) One mark for each pair of rows. 4

Working space
A B C X

0 0 0 1

0 0 1 1

0 1 0 1

0 1 1 0

1 0 0 0

1 0 1 0

1 1 0 0

1 1 1 0

© UCLES 2018 Page 4 of 9


MUHAMMAD ALI KHAN
PAGE 350
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

3(a) 1 mark for correct parity bit 1

Parity bit
0 0 1 0 0 0 0 0

3(b) 1 mark for the correct bit circled. 1

Parity
Data
bit

1 0 1 0 1 1 1 1

0 1 1 0 0 1 1 0

1 1 0 0 0 0 0 0

0 1 0 0 0 0 0 0

Parity
byte 0 0 0 0 1 0 0 1

3(c) 1 mark per each correct row 5

Measure Validation Verification


Checksum
Format check
Range check
Double entry
Check digit

Question Answer Marks

4(a)(i) 219 1

4(a)(ii) DB 1

4(a)(iii) 37 1

4(b)(i) 1 mark from: 1

The symbols that the computer recognises/uses


A list of characters recognised by the computer hardware and
software

© UCLES 2018 Page 5 of 9


MUHAMMAD ALI KHAN
PAGE 351
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

4(b)(ii) 1 mark per bullet to max 2 2

UNICODE has greater range of characters than ASCII


UNICODE represents most written languages in the world while ASCII
does not ASCII used for English only
ASCII uses 7 or 8 bits or one byte whereas UNICODE uses up to 4
bytes per character
UNICODE is standardised while ASCII is not

4(b)(iii) 1 mark for correct working, 1 mark for correct answer 2

Working:

Code for Z = Code for A + 2510


Code for Z = 4116 +2510
Code for Z = 4116 + 1916
Code for Z = 5A16

Answer: 5A16

Question Answer Marks

5(a) 1 mark per bullet to max 3 3

Amplitude (of the sound wave) measured


At set / regular time intervals / per time unit / time period
Value of the sample is recorded as a binary number

5(b) 1 mark per bullet to max 2 2

(Increasing the sampling resolution means) more bits per sample //


larger range of values
Larger file size
More accurate representation of sound

5(c) 1 mark per bullet to max 3 3

Fewer samples (per unit time)


File size will decrease
Larger gaps / spaces between samples // Greater quantization errors
Sound accuracy will reduce // not as close to original sound

© UCLES 2018 Page 6 of 9


MUHAMMAD ALI KHAN
PAGE 352
9608/12 Cambridge Internatio nal AS/A Level – Mark Scheme May/June 2018
P UBLISHED

Question Answer Marks

5(d) 1 mark for naming feature/tool, 1 mark for description. Max 2 feat ures 4
e.g.
Fading
Change the volume of a section of the sound for it get lou der/quieter

Removing sound / elem ents


Delete sections of the so
ound wave, for example, backgro
ound noise

Copy
Repeat elements of the sound wave

Question Answer Marks

6(a) 1 mark each 2


mark
grade

6(b) 25 1

6(c) 1 mark per bullet 2


Takes the value entered in the text box / input field 'Mar k'
Stores (it) in the variable mark // Assigns (it) to the variaable mark

6(d)(i) Client-side 1

6(d)(ii) 1 mark per bullet to max 3 3


Client-side (script) is run on the computer making the reqquest
when the (web page) data is received by the computer
Server-side (script) is ru n on the web server
The results are sent to t he computer that made the reque st

Question Answer Marks

7(a)(i) 1 mark per bullet 2


UserName is the primar y key in USER
UserName is (included as) a foreign key in PHOTO

7(a)(ii) 1 mark for each correct relations hip 2

© UCLES 2018 Page 7 of 9


MUHAMMAD ALI KHAN
PAGE 353
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

7(b) 1 mark per bullet to max 2 for explanation 3


Referential integrity is making sure tables do not try to reference data
which does not exist // A value of one attribute of a table exists as a
value of another attribute in a different table
A primary key cannot be deleted unless all dependent records are
already deleted
Cascading delete
A primary key cannot be updated unless all dependent records are
already updated
Cascading update / edit
Every foreign key value has a matching value in the corresponding
primary key
The foreign keys must be the same data type as the corresponding
primary key

1 mark for a suitable example


e.g.
A UserName cannot be deleted from the USER table if they have a
related photo/textpost
If UserName is updated in USER table, it must also be updated in
PHOTO and TEXTPOST tables
Cannot create/edit a record in TEXTPOST / PHOTO without a matching
entry in USER table

7(c) Max 1 mark from each bulleted group 3

1NF
No repeated groups of attributes
All attributes should be atomic
No duplicate rows

2NF (in 1NF and)


No partial dependencies

3NF (in 2NF and)


No non-key dependencies
No transitive dependencies

7(d)(i) 1 mark per bullet 5


CREATE TABLE USER and ();
UserName, FirstName and SecondName as VARCHAR and commas
DateOfBirth as DATE and comma
PRIMARY KEY(UserName)
An appropriate NOT NULL

CREATE TABLE USER(


UserName: varchar(15) NOT NULL,
FirstName: varchar(25),
SecondName: varchar(25),
DateOfBirth: Date,
PRIMARY KEY(UserName)
);

© UCLES 2018 Page 8 of 9


MUHAMMAD ALI KHAN
PAGE 354
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

7(d)(ii) 1 mark per bullet 2


ALTER TABLE USER
ADD COUNTRY varchar;

ALTER TABLE USER


ADD Country varchar;

© UCLES 2018 Page 9 of 9


PAGE 355

MUHAMMAD ALI KHAN


PAGE 356

MUHAMMAD ALI KHAN


PAGE 357

MUHAMMAD ALI KHAN


PAGE 358

MUHAMMAD ALI KHAN


PAGE 359

MUHAMMAD ALI KHAN


PAGE 360

MUHAMMAD ALI KHAN


PAGE 361

MUHAMMAD ALI KHAN


PAGE 362

MUHAMMAD ALI KHAN


PAGE 363

MUHAMMAD ALI KHAN


PAGE 364

MUHAMMAD ALI KHAN


PAGE 365

MUHAMMAD ALI KHAN


PAGE 366

MUHAMMAD ALI KHAN


PAGE 367

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 368

Cambridge Assessment International Education


Cambridge International Advanced Subsidiary and Advanced Level

COMPUTER SCIENCE 9608/13


Paper 1 Written Paper May/June 2018
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.

IGCSE™ is a registered trademark.

This document consists of 9 printed pages.

© UCLES 2018 [Turn over


MUHAMMAD ALI KHAN
PAGE 369
9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2018 Page 2 of 9


MUHAMMAD ALI KHAN
PAGE 370
9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

1(a) 1 mark for each variable name 2

$gradeChar
$inputMark

1(b) 03 1

1(c) Gets the value stored in the text box / input field “mark”... 2
To be used as a parameter in calculateGrade

1(d) Server-side 1

Question Answer Marks

2(a) 1 mark for each correct relationship 2

2(b) 1 mark for description 2


Ensure data is consistent / accurate // keep data consistent / accurate

1 mark for example from:

e.g.
Validation rules
Referential integrity
Verification
Input masks
Setting data types
Removing redundant data
Backup data
Access controls
Audit trail

2(c) 1 mark for the correct box ticked 3

True False

1 mark per bullet for justification, max 2

No repeated attributes // data is atomic // No partial dependencies (no dual


keys)
No non-key / transitive dependencies

© UCLES 2018 Page 3 of 9


MUHAMMAD ALI KHAN
PAGE 371
9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

2(d)(i) 1 mark per bullet 5

CREATE TABLE PLAYER and ();


PlayerID and PlayerName as VARCHAR and commas
SkillLevel as INT and comma
PRIMARY KEY(PlayerID)
An appropriate NOT NULL

CREATE TABLE PLAYER(


PlayerID: varchar NOT NULL,
PlayerName: varchar,
SkillLevel: int,
PRIMARY KEY(PlayerID),
);

2(d)(ii) 1 mark per bullet 2

ALTER TABLE PLAYER


ADD DateOfBirth Date;

Question Answer Marks

3(a) 1 mark per bullet to max 2 for each group 4

ALU performs arithmetic operations


And logical operations / comparisons

Control Unit sends / receives signals


Synchronises operations
to control operations // execution of instructions
Accept by example e.g. Input output // flow of data

3(b) 1 mark per bullet to max 2 for each group 4

Status Register is interpreted as independent bits / flags


Each flag is set depending on an event
An example: addition overflow / result of operation is zero etc.

Program Counter stores the address


of the next instruction to be fetched

3(c)(i) 193 1

3(c)(ii) C1 1

3(c)(iii) 63 1

3(c)(iv) The first 4 bits / first nibble (would give 12 which) is > 9 / 2 digits (which is not valid 1
for BCD)

© UCLES 2018 Page 4 of 9


MUHAMMAD ALI KHAN
PAGE 372
9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

4(a) Parity bit 1


1 0 1 1 1 0 1 0

4(b) 1 mark for correctly circled bit 1

Parity
Data
bit

0 0 1 1 0 1 0 1

1 1 1 1 1 0 0 1

1 0 1 0 1 0 0 0

0 0 0 1 1 0 1 1

Parity
byte 0 1 1 1 1 1 0 1

4(c) 1 mark for each correct line 4

Error detection measure

Type check

Verification
Proof reading

Check digit Validation

Checksum

© UCLES 2018 Page 5 of 9


MUHAMMAD ALI KHAN
PAGE 373
9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

5(a) 1 mark per correct gate with correct inputs 3

5(b) 1 mark for each correct pair of lines 4

A B C Working space X

0 0 0 0

0 0 1 0

0 1 0 1

0 1 1 0

1 0 0 1

1 0 1 0

1 1 0 0

1 1 1 0

Question Answer Marks

6(a) 1 1

6(b) 1 mark for correct method (colour code and number of pixels) 3
1 mark for first 7 groups correct
1 mark for remainder correct

3B9 1A3 3B3 1A2 3B1 1A2 3B2


1A1 3B3 1A1 3B2 1A2 3B1 1A2 3B3 1A3 3B9

6(c) 5 1

© UCLES 2018 Page 6 of 9


MUHAMMAD ALI KHAN
PAGE 374
9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

6(d) 1 mark for purpose 3


Stores data about the file contents/image/metadata

Max 2 marks for examples of contents

Confirmation that the file is a BMP // confirmation of file type


File size
Location / offset of image data within the file
Dimensions of the image (in pixels) // image resolution
Colour depth (bits per pixel, 1, 4, 8, 16, 24 or 32)
Type of compression used (if any)

6(e) 1 mark for naming tool, 1 mark for describing effect on the photograph 6
e.g.
Resize
Increase / decrease the size of the image

Crop
Remove part of the image

Blur
Reduce the focus

Red eye reduction


Reduces red (light reflected from human eyes)

Question Answer Marks

7(a) 1 mark per bullet to max 4 4


Resistive (screen) consists of two charged plates
Pressure causes the plates to touch
Completing the circuit
Point of contact registered
Coordinates used to calculate the position
Capacitive (screen) made from materials that store electric charge
When touched charge transferred to the finger
Sensors at the (screen) corners detect the change
Point of contact registered
Coordinates used to calculate the position

7(b)(i) 1 mark for suitable device 1


e.g.
Speaker
Headphones

© UCLES 2018 Page 7 of 9


MUHAMMAD ALI KHAN
PAGE 375
9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

7(b)(ii) 1 mark for naming input device 1 mark for use in this scenario, for max 2 devices 4
e.g.
Microphone
...visitor says commands / search criteria for the computer to respond to

Keyboard
...visitor types key words to look for

Mouse
...visitor controls cursor to navigate / select

Trackpad
...visitor uses finger to control cursor to navigate / select

7(c) 1 mark for device 5


(Internal) hard drive / solid state drive

1 mark per bullet. Max 2 marks for each reason, max two reasons
e.g.

Hard drive
Large capacity...
to store videos / images / sound files with large file sizes

Reasonably fast access speed...


Users will not have to wait for videos to load

Inexpensive per unit storage...


If a large number of needed for different exhibits, the cost can be kept low

Does not need to be moved


So moving parts unlikely to be damaged

Slower degradation of data


So will last longer / be more reliable under heavy use

Solid state
Large capacity
To store videos/images/sound files with large file sizes

Fast access speed...


Users will not have to wait for videos to load

Reliable...
Can be dropped/damaged and will likely still work / no moving parts

Quiet...
No moving parts

© UCLES 2018 Page 8 of 9


MUHAMMAD ALI KHAN
PAGE 376
9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

7(d) 1 mark for a correct reason for RAM, 1 mark for a correct reason for ROM 2

RAM
Currently running data / video / music / images / software

ROM
Boot up instructions / OS kernel

© UCLES 2018 Page 9 of 9


MUHAMMAD ALI KHAN
PAGE 377

Cambridge International Examinations


Cambridge International Advanced Subsidiary and Advanced Level
* 8 9 3 1 1 6 5 4 3 6 *

COMPUTER SCIENCE 9608/11


Paper 1 Theory Fundamentals October/November 2018
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 15 printed pages and 1 blank page.

DC (ST) 144490/3
© UCLES 2018 [Turn over
MUHAMMAD ALI KHAN
PAGE 378

1 A student is creating a short video and needs to record music to play in the background.

(a) The student uses a microphone to capture the music.

Explain how the microphone captures the music.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) An analogue-to-digital converter uses sampling to encode the sound.

Explain how different sampling resolutions affect the sound file and the sound it represents.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(c) The student needs to edit the sound file.

Describe two features of sound editing software that can be used to edit the sound file.

Feature 1 ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Feature 2 ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2018 9608/11/O/N/18


MUHAMMAD ALI KHAN
PAGE 379

(d) The video is recorded with a frame rate of 60 frames per second (fps) and uses progressive
encoding.

(i) Describe what is meant by a frame rate of 60 fps.

...........................................................................................................................................

.......................................................................................................................................[1]

(ii) Describe what is meant by progressive encoding in video recording.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(e) MP4 multimedia container format is used to save the video.

State what is meant by multimedia container format.

...................................................................................................................................................

...............................................................................................................................................[1]

© UCLES 2018 9608/11/O/N/18 [Turn over


MUHAMMAD ALI KHAN
PAGE 380

2 Computer A needs to access a web page.

(a) State how Computer A could access the web page without using a Domain Name Service
(DNS).

...................................................................................................................................................

...............................................................................................................................................[1]

(b) (i) The following table shows four IPv6 addresses.

State if each address is valid or invalid.

IP address Valid or invalid

21E5:69AA:FFFF:1:E100:B691:1285:F56E

::255.255.255.255

59FB::1005:CC57:6571

56FE::2159:5BBC::6594

[4]

(ii) The following table shows four statements about either public or private IP addresses.

Tick () one box in each row to indicate whether each statement refers to a public or a
private IP address.

Statement Public Private

192.168.2.1 is an example of this type of address

Assigned by the Internet Service Provider (ISP)

IP address cannot be duplicated in different


networks
Network Address Translation (NAT) is necessary
to access the Internet directly
[4]

(c) One type of transmission media is copper cable.

Give two additional types of transmission media.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

© UCLES 2018 9608/11/O/N/18


MUHAMMAD ALI KHAN
PAGE 381

3 Hugo has produced a program (app) for mobile phones. He needs to decide whether to use an
Open Source licence or to distribute the app as shareware.

(a) Describe what is meant by Open Source licence and shareware.

Open Source ............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Shareware ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(b) Tick () one box to indicate the licence Hugo should use. Justify your choice.

Open Source
Shareware

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 9608/11/O/N/18 [Turn over


MUHAMMAD ALI KHAN
PAGE 382

4 The table shows assembly language instructions for a processor which has one general purpose
register, the Accumulator (ACC) and an index register (IX).

Instruction
Explanation
Op code Operand
Direct addressing. Load the contents of the location at the given
LDD <address>
address to ACC.
Indexed addressing. Form the address from <address> + the
LDX <address> contents of the Index Register. Copy the contents of this calculated
address to ACC.
LDR #n Immediate addressing. Load the number n to IX.
STO <address> Store contents of ACC at the given address.
ADD <address> Add the contents of the given address to ACC.
INC <register> Add 1 to the contents of the register (ACC or IX).
DEC <register> Subtract 1 from the contents of the register (ACC or IX).
CMP <address> Compare contents of ACC with contents of <address>.
Following a compare instruction, jump to <address> if the compare
JPE <address>
was True.
Following a compare instruction, jump to <address> if the compare
JPN <address>
was False.
JMP <address> Jump to the given address.
OUT Output to the screen the character whose ASCII value is stored in ACC.
END Return control to the operating system.

(a) (i) State what is meant by direct addressing and indirect addressing.

Direct addressing ..............................................................................................................

...........................................................................................................................................

Indirect addressing ............................................................................................................

...........................................................................................................................................
[2]

(ii) Explain how the instruction ADD 20 can be interpreted as either direct or indirect
addressing.

Direct addressing ..............................................................................................................

...........................................................................................................................................

Indirect addressing ............................................................................................................

...........................................................................................................................................
[2]

© UCLES 2018 9608/11/O/N/18


MUHAMMAD ALI KHAN
PAGE 383

(b) The assembly language instructions in the following table use either symbolic addressing or
absolute addressing.

Tick () one box in each row to indicate whether the instruction uses symbolic or absolute
addressing.

Instruction Symbolic Absolute

ADD 90

CMP found

STO 20

[2]

(c) The current contents of a general purpose register (X) are:

X 1 0 1 1 1 0 1 0

(i) The contents of X represent an unsigned binary integer.

Convert the value in X into denary.

.......................................................................................................................................[1]

(ii) The contents of X represent an unsigned binary integer.

Convert the value in X into hexadecimal.

.......................................................................................................................................[1]

(iii) 7KHFRQWHQWVRI;UHSUHVHQWDWZR·VFRPSOHPHQWELQDU\LQWHJHU

Convert the value in X into denary.

.......................................................................................................................................[1]

© UCLES 2018 9608/11/O/N/18 [Turn over


MUHAMMAD ALI KHAN
PAGE 384

(d) The current contents of the main memory, Index Register (IX) and selected values from the
ASCII character set are provided with a copy of the instruction set.

Address Instruction ASCII code table (selected codes only)


70 LDX 200 ASCII code Character
71 OUT 127 ?
72 STO 203 128 !
73 LDD 204 129 “
74 INC ACC 130 *
75 STO 204 131 $
76 INC IX 132 &
77 LDX 200 133 %
78 CMP 203 134 /
79 JPN 81
Instruction set
80 OUT
81 LDD 204 Instruction
Op Explanation
82 CMP 205 Operand
code
83 JPN 74
Direct addressing. Load the contents of
84 END LDD <address>
the location at the given address to ACC.
… Indexed addressing. Form the address
from <address> + the contents of the
LDX <address>
200 130 Index Register. Copy the contents of this
calculated address to ACC.
201 133
Immediate addressing. Load the number
202 130 LDR #n
n to IX.
203 0 Store contents of ACC at the given
STO <address>
address.
204 0
Add the contents of the given address to
205 2 ADD <address>
ACC.
Add 1 to the contents of the register (ACC
INC <register>
or IX).
IX 0
Subtract 1 from the contents of the
DEC <register>
register (ACC or IX).
Compare contents of ACC with contents of
CMP <address>
<address>.
Following a compare instruction, jump to
JPE <address>
<address> if the compare was True.
Following a compare instruction, jump to
JPN <address>
<address> if the compare was False.
JMP <address> Jump to the given address.
Output to the screen the character whose
OUT
ASCII value is stored in ACC.
END Return control to the operating system.

© UCLES 2018 9608/11/O/N/18


MUHAMMAD ALI KHAN
PAGE 385

Complete the trace table for the given assembly language program.

Instruction Memory address


ACC IX OUTPUT
address 200 201 202 203 204 205

70 130 130 133 130 0 0 2 0

[8]

© UCLES 2018 9608/11/O/N/18 [Turn over


MUHAMMAD ALI KHAN
PAGE 386

10

5 For each of the following scenarios, tick () one box for each scenario to indicate whether you
WKLQNWKHSHUVRQ·VEHKDYLRXULVHWKLFDORUXQHWKLFDO-XVWLI\\RXUFKRLFH

(a) Kevin is a software engineer who has recently started a job with a new company. He is using
SURJUDPFRGHIURPKLVSUHYLRXVHPSOR\HULQKLVQHZHPSOR\HU·VSURJUDPV

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Nadya is a software developer. She has accepted a new job. She has never worked with
the programming languages used by this new company. Nadya is planning to increase her
knowledge of these programming languages before she starts her new job.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) Maria finds that one of her team members has produced some inventive code. She presents
this to her manager, stating that it was produced by the team. She does not mention the
LQGLYLGXDO·VQDPH

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 9608/11/O/N/18


MUHAMMAD ALI KHAN
PAGE 387

11

6 A web page includes the following PHP and HTML code.

01 <?php
02 if(isset($_GET['age'])) {
03 echo "Result: ", allowed($_GET['age']);
04 } else {
05 ?>
06
07 <form action="#" method="get">
08 Enter Age: <input type="text" name="age" /><br/>
09 <input type="submit" value="Calculate" />
10 </form>
11
12 <?php
13 }
14 function allowed($age) {
15 if($age <= 16) $message = "You need permission";
16 else if($age > 30) $message = "You are too old";
17 else $message = "Allowed";
18 return $message;
19 }
20 ?>

(a) Name two identifiers used in the PHP code.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Write the value assigned to $message if the user types 30 in the text box.

...............................................................................................................................................[1]

(c) Explain the purpose of the code in line 18.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 9608/11/O/N/18 [Turn over


MUHAMMAD ALI KHAN
PAGE 388

12

(d) The PHP code in a web page uses server-side scripting.

List the sequence of events that take place when a user requests a web page containing PHP
code.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2018 9608/11/O/N/18


MUHAMMAD ALI KHAN
PAGE 389

14

7 A movie theatre has a relational database that stores the movie schedule, and information about
the movies. The theatre has several screens that play movies at the same time.

The database has three tables to store information about the movies, the screens and the movie
schedule.

MOVIE(MovieID, Title, Length, Rating)

SCREEN(ScreenNumber, NumberSeats)

MOVIESCHEDULE(ScheduleID, MovieID, ScreenNumber, Time)

(a) Complete the entity-relationship (E-R) diagram to show the relationships between these
tables.

MOVIE SCREEN

MOVIESCHEDULE

[2]

(b) Explain how primary and foreign keys are used to link the tables in the movie theatre
database.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2018 9608/11/O/N/18


MUHAMMAD ALI KHAN
PAGE 390

15

(c) The database needs to store the name of the company that produced each movie, for
example, Rocking Movies.

Write an SQL script to add the attribute ProductionCompany to the MOVIE table.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(d) Write an SQL script to display the title and rating of all movies scheduled to play on screen
number 3.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2018 9608/11/O/N/18


MUHAMMAD ALI KHAN
PAGE 391

Cambridge Assessment International Education


Cambridge International Advanced Subsidiary and Advanced Level

COMPUTER SCIENCE 9608/11


Paper 1 Written Paper October/November 2018
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 10 printed pages.

© UCLES 2018 [Turn over


MUHAMMAD ALI KHAN
PAGE 392
9608/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2018 Page 2 of 10


MUHAMMAD ALI KHAN
PAGE 393
9608/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

1(a) 1 mark per bullet point to max 3 3

The microphone has a diaphragm


The incoming sound waves cause vibrations
« causing a coil to move past a magnet (dynamic microphone) //
changing the capacitance (condenser microphone)
An electric current is generated / changed

1(b) 1 mark per bullet point 3

The sampling resolution number of bits used to store each sample


Increasing the (sampling) resolution means a larger file size //
Decreasing the (sampling) resolution means a smaller file size
Increasing the (sampling) resolution gives a more accurate
representation of the analogue sound // Decreasing the (sampling)
resolution gives a less accurate representation of the analogue sound
Increasing the (sampling) resolution means a greater range of values
can be stored // Decreasing the (sampling) resolution gives a smaller
range of values that can be stored
Increasing the (sampling) resolution reduces the quantization errors //
Decreasing the (sampling) resolution causes greater quantization errors

1(c) For 2 features 4


1 mark for identifying feature, 1 mark for describing what it does.

For example:

Cut/delete
... Remove part of the sound file

Copy and paste


... Replicate part of the sound

Amplify
... Increase the volume of a section of sound

1(d)(i) 60 images are recorded per second 1

1(d)(ii) 1 mark per bullet point to max 2 2

Each frame contains (all the lines for) the complete image
All the frame data is recorded at the same time
Each frame contains all the scan lines
The number of images stored is the same as the frame rate

1(e) 1 mark per bullet point to max 1 1

A meta file / wrapper


Contains various different types of data

© UCLES 2018 Page 3 of 10


MUHAMMAD ALI KHAN
PAGE 394
9608/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

2(a) Use the IP address instead of the URL 1

2(b)(i) 1 mark per correct answer 4

IP Address Valid or invalid

21E5:69AA:FFFF:1:E100:B691:1285:F56E Valid

::255.255.255.255 Valid

59FB::1005:CC57:6571 Valid

56FE::2159:5BBC::6594 Invalid

2(b)(ii) 1 mark per correct row 4

Statement Public Private

192.168.2.1 is an example of this type of address 3

Assigned by the Internet Service Provider (ISP) 3

IP address cannot be duplicated in different 3


networks

Network Address Translation (NAT) is necessary 3


to access the Internet directly

2(c) 1 mark per example to max 2 2

Fibre-optic
Wi-Fi / Radio waves
Microwave
Infrared

© UCLES 2018 Page 4 of 10


MUHAMMAD ALI KHAN
PAGE 395
9608/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

3(a) 1 mark per bullet point, max 2 marks per licence 4

Open Source
The source code is released with program
Users can edit the source code to suit their needs
Users re-release their version under the same terms
Can be cost-free but may also need payment

Shareware
Users get a free trial of the software
« which may be limited in features
No access to source code // Program cannot be edited
Then they have to pay / sign-up after the expiry date // Then they have
to pay / sign-up to get full functionality // Then they have to pay / sign-up
to stop unwanted pop-ups, etc.

3(b) 1 mark per bullet point to max 2 marks for chosen licence 2

Open Source
For example:
Hugo does not have to set up ways to take funds
Others may enhance / improve the program
Hugo can charge a fee for the App

Or

Shareware
For example:
Hugo can charge for the App
Not giving away the code/people can't copy the code
« Hugo gets the sole recognition for the program
Possible legal consequences if someone does copy the code
If users need to sign up, their data can be used for marketing etc.
Customers have peace of mind that the software hasn’t been
maliciously edited / bugs introduced

Question Answer Marks

4(a)(i) 1 mark for each type of addressing 2

Direct addressing
The operand is the address where the data is stored

Indirect addressing
The operand is an address, that address holds another address where
the data is stored

© UCLES 2018 Page 5 of 10


MUHAMMAD ALI KHAN
PAGE 396
9608/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

4(a)(ii) 1 mark per bullet point 2

Direct addressing:
20 is the address of the data

Indirect addressing:
20 is an address which holds the address where the data is stored

4(b) 1 mark for 1 correct tick 2


2 marks for 3 correct ticks

Instruction Symbolic Absolute

ADD 90 9

CMP found 9

STO 20 9

4(c)(i) 186 1

4(c)(ii) BA 1

4(c)(iii) –70 1

4(d) 1 mark per bullet point 8

Outputting * (instruction 71)


Storing 130 in 203 (instruction 72)
Loading, incrementing accumulator and storing in 204 (instructions 73,
74 and 75)
Incrementing Index Register (instruction 76)
Loading 133, comparing and jumping to 81 (instructions 77, 78 and 79)
Loading, comparing and jumping to 74 (instructions 81, 82 and 83)
Incrementing accumulator, storing in 204 and incrementing index
register, loading 130 (instructions 74–79)
Outputting * to end (instructions 80–84)

© UCLES 2018 Page 6 of 10


MUHAMMAD ALI KHAN
PAGE 397
9608/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Instruction Memory address IX (Index


address ACC Register) OUTPUT
200 201 202 203 204 205

70 130 130 133 130 0 0 2 0

71 *

72 130

73 0

74 1

75 1

76 1

77 133

78

79

81 1

82

83

74 2

75 2

76 2

77 130

78

79

80 *

81 2

82
83

84

© UCLES 2018 Page 7 of 10


MUHAMMAD ALI KHAN
PAGE 398
9608/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

5(a) 1 mark per bullet point for each justification, to max 2 2

Either Unethical
Work belongs to the company it was created for // copyright
« Kevin cannot use it without permission
It reduces the integrity of the person / profession / new company
Reference to IEEE standards in context

Or Ethical
The program code could be open source
Kevin might own the copyright of code
Kevin may have permission to use the code
Reference to IEEE standards in context

5(b) 1 mark per bullet point for each justification, to max 2 2

Either Unethical
Nadya has accepted a role / work she knows she cannot do
This reduces the integrity of the person
She may let down the new organisation who are expecting her to be
able to do the work
Reference to IEEE standards in context

Or Ethical
She is taking steps to prepare for the role
« Without expecting the company to do it
Nadya may have told the company that she didn’t know the languages
but that she would learn them
Reference to IEEE standards in context

5(c) 1 mark per bullet point for each justification, to max 2 2

Either Ethical
The individual works as part of the team «
« therefore, the team should / will get the credit
Maria is not lying about who produced it
Reference to IEEE standards in context

Or Unethical
Maria should identify who / where the idea originated
It prevents the individual getting recognition
Maria is not being supportive of the individual
Reference to IEEE standards in context

© UCLES 2018 Page 8 of 10


MUHAMMAD ALI KHAN
PAGE 399
9608/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

6(a) 1 mark per bullet point to max 2 2

$age
$message
allowed

6(b) Allowed 1

6(c) 1 mark per bullet point 2

Passes the value in $message / message variable «


« back to the code that called it // « to replace the function call

6(d) 1 mark per bullet point to max 4 4

The (client web) browser requests the web page from the web server
The web server accesses the page (from its hard drive)
The web server processes / executes the PHP code «
« and produces the HTML for the web page // « the web server
creates the web page
The web server returns the (HTML) web page to the client web browser

Question Answer Marks

7(a) 1 mark for each correct join 2

MOVIE SCREEN

MOVIESCHEDULE

7(b) 1 mark per bullet point 4

MovieID is the Primary Key in MOVIE


« links to MovieID which is the Foreign Key in MOVIESCHEDULE
ScreenNumber is the Primary Key in SCREEN
« links to ScreenNumber which is the Foreign Key in
MOVIESCHEDULE

7(c) 1 mark per bullet point 2

ALTER TABLE MOVIE


ADD (COLUMN)ProductionCompany VARCHAR(25);

© UCLES 2018 Page 9 of 10


MUHAMMAD ALI KHAN
PAGE 400
9608/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

7(d) 1 mark per bullet point 4

Answer 1:
SELECT Title, Rating
FROM MOVIE, MOVIESCHEDULE
WHERE MOVIE.MovieID = MOVIESCHEDULE.MovieID
AND MOVIESCHEDULE.ScreenNumber = 3;

Or

Answer 2:
SELECT Title, Rating
FROM MOVIE INNER JOIN MOVIESCHEDULE
ON MOVIE.MovieID = MOVIESCHEDULE.MovieID
WHERE MOVIESCHEDULE.ScreenNumber = 3;

© UCLES 2018 Page 10 of 10


MUHAMMAD ALI KHAN
PAGE 401

Cambridge International Examinations


Cambridge International Advanced Subsidiary and Advanced Level
* 6 0 5 4 1 9 8 9 6 8 *

COMPUTER SCIENCE 9608/12


Paper 1 Theory Fundamentals October/November 2018
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 13 printed pages and 3 blank pages.

DC (NF/CGW) 144492/3
© UCLES 2018 [Turn over
MUHAMMAD ALI KHAN
PAGE 402

1 A company is designing a website.

(a) The company creates a 4-colour bitmap image for the website as shown.

Each colour is represented by a letter, for example, G = grey, K = black.

G R G K W R

G R G K W R

G R G K W R

G R G K W R

G G G K K R

W W W W K R

(i) State the minimum number of bits needed to represent each pixel in the image in part (a).

...................................................................................................................................... [1]

(ii) Calculate the minimum file size of the image shown in part (a). Show your working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

File size .............................................................................................................................


[3]

(b) The company takes a photograph of their office to put on the website. The photograph has
a resolution of 1000 pixels by 1000 pixels. Two bytes per pixel are used to represent the
colours.

(i) Estimate the file size of the photograph in megabytes. Show your working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Estimated file size .............................................................................................................


[4]

© UCLES 2018 9608/12/O/N/18


MUHAMMAD ALI KHAN
PAGE 403

(ii) The file size of the photograph needs to be reduced before it is placed on the website.

Draw lines to link each method of reducing the file size of the image to:

• its description and


• its compression type, where appropriate.

Description Method Compression type

Removes pixels
Crop the
photograph
Reduces number of
Lossy
pixels per inch
Use run-length
encoding
Uses fewer bits per
Lossless
pixel
Use fewer
colours
Stores colour code and
count of repetitions

[5]

(c) The company has created a logo for the website. The logo is a vector graphic.

Describe two reasons why a vector graphic is a sensible choice for the logo.

Reason 1 ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Reason 2 ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2018 9608/12/O/N/18 [Turn over


MUHAMMAD ALI KHAN
PAGE 404

2 Gopal types the Uniform Resource Locator (URL) of a website into a web browser.

(a) The following sequence (1 to 5) describes the steps that take place. There are three missing
statements.

1 Gopal types into the web browser.

2 ......................................

3 DNS looks up the URL in table

4 ......................................

5 ......................................

Three statements A, B and C are used to complete the sequence.

A DNS finds corresponding IP address


B Web browser sends URL to Domain Name Service (DNS)
C DNS returns IP address to web browser

Write one of the letters A to C in the appropriate rows (2, 4 and 5) to complete the sequence.
[2]

(b) Describe the purpose of an IP address.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(c) $WHOHFRPPXQLFDWLRQVRSHUDWRUKDVLQVWDOOHGILEUHRSWLFFDEOHVLQ*RSDO·VQHLJKERXUKRRG

(i) Give three benefits of fibre-optic cable over copper cable.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2018 9608/12/O/N/18


MUHAMMAD ALI KHAN
PAGE 405

(ii) Give two drawbacks of fibre-optic cable over copper cable.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2018 9608/12/O/N/18 [Turn over


MUHAMMAD ALI KHAN
PAGE 406

3 The following table shows assembly language instructions for a processor which has one general
purpose register, the Accumulator (ACC) and an Index Register (IX).

Instruction
Explanation
Op code Operand

LDD <address> Direct addressing. Load the contents of the location at the given address to
ACC.
LDX <address> Indexed addressing. Form the address from <address> + the contents of the
Index Register. Copy the contents of this calculated address to ACC.
LDR #n Immediate addressing. Load the number n to IX.
STO <address> Store contents of ACC at the given address.
ADD <address> Add the contents of the given address to ACC.
INC <register> Add 1 to the contents of the register (ACC or IX).
DEC <register> Subtract 1 from the contents of the register (ACC or IX).
CMP <address> Compare contents of ACC with contents of <address>.
JPE <address> Following compare instruction, jump to <address> if the compare was True.
JPN <address> Following compare instruction, jump to <address> if the compare was False.
JMP <address> Jump to the given address.
OUT Output to the screen the character whose ASCII value is stored in ACC.
END Return control to the operating system.

(a) (i) State what is meant by absolute addressing and symbolic addressing.

Absolute addressing ..........................................................................................................

...........................................................................................................................................

Symbolic addressing .........................................................................................................

...........................................................................................................................................
[2]

(ii) Give an example of an ADD instruction using both absolute addressing and symbolic
addressing.

Absolute addressing ..........................................................................................................

Symbolic addressing .........................................................................................................


[2]

© UCLES 2018 9608/12/O/N/18


MUHAMMAD ALI KHAN
PAGE 407

(b) (i) State what is meant by indexed addressing and immediate addressing.

Indexed addressing ...........................................................................................................

...........................................................................................................................................

Immediate addressing .......................................................................................................

...........................................................................................................................................
[2]

(ii) Give an example of an instruction that uses:

Indexed addressing ...........................................................................................................

Immediate addressing .......................................................................................................


[2]

(c) The current contents of a general purpose register (X) are:

X 1 1 0 0 0 0 0 1

(i) The contents of X represent an unsigned binary integer.

Convert the value in X into denary.

...................................................................................................................................... [1]

(ii) The contents of X represent an unsigned binary integer.

Convert the value in X into hexadecimal.

...................................................................................................................................... [1]

(iii) 7KHFRQWHQWVRI;UHSUHVHQWDWZR·VFRPSOHPHQWELQDU\LQWHJHU

Convert the value in X into denary.

...................................................................................................................................... [1]

© UCLES 2018 9608/12/O/N/18 [Turn over


MUHAMMAD ALI KHAN
PAGE 408

(d) The current contents of the main memory, Index Register (IX) and selected values from the
ASCII character set are:

Address Instruction ASCII code table (selected codes only)


40 LDD 100 ASCII code Character
41 CMP 104 300 /
42 JPE 54 301 *
43 LDX 100 302 -
44 CMP 105 303 +
45 JPN 47 304 ^
46 OUT 305 =
47 LDD 100
48 DEC ACC
49 STO 100
50 INC IX
51 JMP 41
52
53
54 END

100 2
101 302
102 303
103 303
104 0
105 303

IX 1

This is a copy of the instruction set.

Instruction
Explanation
Op code Operand

LDD <address> Direct addressing. Load the contents of the location at the given address to
ACC.
LDX <address> Indexed addressing. Form the address from <address> + the contents of the
Index Register. Copy the contents of this calculated address to ACC.
LDR #n Immediate addressing. Load the number n to IX.
STO <address> Store contents of ACC at the given address.
ADD <address> Add the contents of the given address to ACC.
INC <register> Add 1 to the contents of the register (ACC or IX).
DEC <register> Subtract 1 from the contents of the register (ACC or IX).
CMP <address> Compare contents of ACC with contents of <address>.
JPE <address> Following a compare instruction, jump to <address> if the compare was True.
JPN <address> Following a compare instruction, jump to <address> if the compare was False.
JMP <address> Jump to the given address.
OUT Output to the screen the character whose ASCII value is stored in ACC.
END Return control to the operating system.

© UCLES 2018 9608/12/O/N/18


MUHAMMAD ALI KHAN
PAGE 409

Complete the trace table for the given assembly language program.

Instruction Memory address


address ACC IX OUTPUT
100 101 102 103 104 105
2 302 303 303 0 303 1
40

[7]

© UCLES 2018 9608/12/O/N/18 [Turn over


MUHAMMAD ALI KHAN
PAGE 410

10

4 A student has written the steps of the fetch stage of the fetch-execute (FE) cycle in register transfer
notation. The student has made some errors.

Line 1 MDR [PC]

Line 2 PC PC + 1

Line 3 MDR [MAR]

Line 4 CIR PC

(a) Identify the line numbers of three errors that the student has made. Write the correct notation
for each error.

Line number of error Correct notation

[3]

(b) One stage of the FE cycle includes checking for interrupts.

(i) Give three different events that can generate an interrupt.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

(ii) Explain how interrupts are handled during the fetch-execute cycle.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [5]
© UCLES 2018 9608/12/O/N/18
MUHAMMAD ALI KHAN
PAGE 411

11

(c) The processor uses buses in the FE cycle.

The diagram shows three buses and two descriptions.

Draw one line from each bus to its appropriate description.

Bus Description

Control bus
Unidirectional
(one direction)

Address bus

Bidirectional
(two directions)
Data bus

[2]

5 This question presents three scenarios. For each scenario, tick () one box to show whether you
WKLQNWKHSHUVRQ·VEHKDYLRXULVHWKLFDORUXQHWKLFDO-XVWLI\\RXUFKRLFH

(a) Wendy is a software engineer who is developing a program for her company. Her friend,
Noah, is developing a program for a different company. Wendy looks at the code that Noah is
writing to get ideas for her own program.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© UCLES 2018 9608/12/O/N/18 [Turn over


MUHAMMAD ALI KHAN
PAGE 412

12

(b) Amit is fixing some bugs in the computer system of a large multinational company. He is
asked to sign a confidentiality agreement. He sees some confidential information which
contains the names of other multinational companies that have broken the law. He copies this
information and releases it on the Internet.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(c) Farah is providing a company with an estimate for the cost of writing a program. The company
she works for is in financial difficulty so she increases the estimate by 10%.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

6 Kim is using her laptop computer to write a program in a high-level language.

(a) Kim needs to make sure the program is secure against unauthorised access. She has already
set up a username and password on her laptop.

Identify two additional electronic measures that Kim can use to keep the program secure.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Kim will use library routines in her program.

(i) Describe what is meant by a library routine.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

© UCLES 2018 9608/12/O/N/18


MUHAMMAD ALI KHAN
PAGE 413

13

(ii) Describe one benefit and one drawback of using library routines.

Benefit ...............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Drawback ..........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

(c) Kim develops her program and makes it ready for use. To do this, she uses first an interpreter
and then a compiler.

Explain why Kim needs to use both an interpreter and a compiler.

Interpreter .................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Compiler ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2018 9608/12/O/N/18


MUHAMMAD ALI KHAN
PAGE 414

Cambridge Assessment International Education


Cambridge International Advanced Subsidiary and Advanced Level

COMPUTER SCIENCE 9608/12


Paper 1 Written Paper October/November 2018
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 11 printed pages.

© UCLES 2018 [Turn over


MUHAMMAD ALI KHAN
PAGE 415
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2018 Page 2 of 11


MUHAMMAD ALI KHAN
PAGE 416
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

1(a)(i) 2 1

1(a)(ii) 1 mark per bullet point 3

• Number of pixels: 6 × 6 // 36
• Number of bits: Number of pixels (36) × 2 «
• « = 72 bits // 9 bytes

1(b)(i) 1 mark per bullet point 4

• Number of pixels: 1000 × 1000 // 1ௗ000ௗ000


• Number of bytes: Number of pixels (1ௗ000ௗ000) × 2 // 2ௗ000ௗ000 //
Number of bits: Number of pixels (1ௗ000ௗ000) × 16 // 16ௗ000ௗ000
• Conversion to megabytes
• 2ௗ(MB) // 1.91ௗ(MB)

1(b)(ii) 1 mark per method correctly linked to its description max 3 5


1 mark for each compression type correctly linked to its method(s). max 2

Description Method Compression type

1(c) 1 mark per bullet point. Max 2 marks for each reason. 4

• Smaller file size


• Can be transferred quicker/downloaded quicker

• Enlarges without pixilation


• Needs to be used on different screens / devices / resolutions

Question Answer Marks

2(a) 1 mark for 1 correct answer, 2 marks for all 3 correct answers 2

1 Gopal types into the web browser


2 B (Web browser sends URL to Domain name Service (DNS))
3 DNS looks up URL in a table
4 A (DNS finds corresponding IP address)
5 C (DNS returns IP address to web browser)

© UCLES 2018 Page 3 of 11


MUHAMMAD ALI KHAN
PAGE 417
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

2(b) 1 mark per bullet point to max 2 2

• Gives each device on a network an identifier // IP address used to


locate a device on a network
• Each address is unique within the network
• Allows a device/gateway/node to send data to the correct destination / a
specific device/gateway/node

2(c)(i) 1 mark per bullet point to max 3 3

• Less interference in signal


• Signal does not degrade as fast // Needs less signal boosting
• More difficult to hack // more secure
• Greater bandwidth // Faster transmission speeds possible

2(c)(ii) 1 mark per bullet point to max 2 2

• (Initial) installation cost is higher // Cable / hardware is more expensive


to buy (per metre)
• Specialists / trained personnel needed to install / maintain
• Difficult to terminate // Electronics at both ends are more complex
• Fibre-optic cables can break when bent
• Only transmits data in one direction
• If a fibre-optic cable connection fails, many more services can be
affected

Question Answer Marks

3(a)(i) 1 mark per bullet point 2


Absolute addressing:
• The operand is a numeric address // The numeric address is given //
referring directly to a memory location
Symbolic addressing:
• The operand is a word/symbol // A word/symbol represents the memory
location/address

3(a)(ii) 1 mark per example 2

Absolute addressing: For example, ADD 230

Symbolic addressing: For example, ADD num1

3(b)(i) 1 mark per bullet point 2

Indexed addressing:
• The address to be used is formed by:
operand + the contents of the Index Register (IX)

Immediate addressing:
• The operand is not an address // the operand is the actual value to be
loaded

© UCLES 2018 Page 4 of 11


MUHAMMAD ALI KHAN
PAGE 418
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

3(b)(ii) 1 mark per example 2

Indexed: For example, LDX 20

Immediate: For example, ADD #20

3(c)(i) 193 1

3(c)(ii) C1 1

3(c)(iii) –63 1

3(d) 1 mark per bullet point 7

• Loading 2, comparing with 104 (instructions 40 and 41)


• Loading 302 (instruction 43)
• Comparing, and branching to 47 (instructions 44, 45)
• Loading, decrementing accumulator and storing (instructions 47, 48 and
49)
• Incrementing Index Register (instruction 50)
• Loading 303, comparing and outputting + (instructions 43–46)
• Loading, decrementing accumulator and storing, incrementing Index
Register and end (instructions 47–51, 41, 42 and 54)

© UCLES 2018 Page 5 of 11


MUHAMMAD ALI KHAN
PAGE 419
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

Instruction Memory address


address IX OUTPUT
ACC
100 101 102 103 104 105
2 302 303 303 0 303 1
40 2

41

43 302

44

45

47 2

48 1

49 1

50 2

51

41

42

43 303

44

45

46 +

47 1

48 0

49 0

50 3

51

41

54

© UCLES 2018 Page 6 of 11


MUHAMMAD ALI KHAN
PAGE 420
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

4(a) 1 mark per correct line, max 3 3

Line number of error Correct notation

1 MAR m [PC]

3 MDR m [ [MAR] ]

4 CIR m [MDR]

2 PC m [PC] + 1

4(b)(i) 1 mark for each event to max 3 3

For example:
• Hardware fault // Example of hardware fault
• I/O request // Example of I/O request
• Program/software error // Example of software error
• End of a time-slice

4(b)(ii) 1 mark per bullet point to max 5 5

• At the end of each fetch–execute cycle the processor checks for


interrupt(s)
• Check if an interrupt flag is set // Check if bit set in interrupt register
• Processor identifies source of interrupt
• Processor checks priority of interrupt
• If interrupt priority is high enough // Lower priority interrupts are disabled
• Processor saves current contents of registers
• Processor calls interrupt handler / Interrupt Service Routine (ISR)
• Address of ISR is loaded into Program Counter (PC)
• When servicing of interrupt complete, processor restores registers
• Lower priority interrupts are re-enabled
• Processor continues with next F–E cycle

© UCLES 2018 Page 7 of 11


MUHAMMAD ALI KHAN
PAGE 421
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

4(c) 1 mark for 1 correct connection 2


2 marks for all 3 correct connections

Question Answer Marks

5(a) 1 mark per bullet point for each justification, to max 2 2

Either Unethical
• Noah’s work may be confidential
• Wendy shouldn't claim someone else’s ideas / work as her own
• She is bringing the profession into disrepute
• Reference to IEEE standards in context

Or Ethical
• The code could be open source
• Wendy may have permission from Noah
• Wendy isn’t copying the code, just getting ideas
• Reference to IEEE standards in context

© UCLES 2018 Page 8 of 11


MUHAMMAD ALI KHAN
PAGE 422
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

5(b) 1 mark per bullet point for each justification, to max 2 2

Either Unethical
• Amit has a responsibility to his company
• He should have taken it to the police rather than putting it on the
Internet
• He has a signed agreement to say he will not give anything away
• Reference to IEEE standards in context

Or Ethical
• Amit is acting in the public interest
• Amit may not have actually signed the confidentiality agreement
• If acting illegally, the multinational company should be brought to justice
• Reference to IEEE standards in context

5(c) 1 mark per bullet point for each justification, to max 2 2

Either Ethical
• It might save people’s jobs
• Farah is acting in the best interest of her company
• Reference to IEEE standards in context

Or Unethical
• Farah has a responsibility to act in the best interest of her client
• It could give her company a bad reputation
• Reference to IEEE standards in context

Question Answer Marks

6(a) 1 mark for each method to max 2 2

• Biometric authentication // by example


• Two-step authentication // by example
• Firewall / proxy
• Encryption
• Different access rights for different users
• Password protect file (using a different password)
• Anti-malware

6(b)(i) 1 mark per bullet to max 2 2

• Pre-existing / pre-compiled / pre-written modules / code «


• « can be linked into her program (without amendment)
• To perform common / complex tasks

© UCLES 2018 Page 9 of 11


MUHAMMAD ALI KHAN
PAGE 423
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

6(b)(ii) 1 mark per bullet point. Max 2 for one benefit, max 2 for one drawback 4

Benefit:
• Less code needs to be written
• « saves time / saves re-inventing the wheel

• Pre-tested // Used by many people


• ... reduces time testing // can be fairly sure that the function will perform
as it should

• Can be written in a different programming language


• « making use of special features of that language

• Can be complex algorithms (e.g. mathematical/graphics functions)


• ... she does not need to work out how to write it // «that she may not
know how to code

• Simplifies the program


• « since just the name of the function included in the source code

Drawback:
• Compatibility issues
• « may not work with the other code/may require changing program for
it to work

• Not guaranteed thorough testing


• « may be unknown or unexpected bugs / virus

• Library routine may not meet exact needs


• « may give unexpected results // « may need editing

• If library routine is changed


• « there may be unexpected results / errors

© UCLES 2018 Page 10 of 11


MUHAMMAD ALI KHAN
PAGE 424
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

6(c) 1 mark per bullet point. Max 3 marks for interpreter, max 3 marks for 4
compiler

Interpreter:
• Used during development
• Debugging is easier
• « Because errors are reported as they are found // No need to wait
until the end of the process for the error report
• « Because errors can be corrected as they are found

Compiler:
• Compiler used when development complete // compiler used when
program ready for distribution
• Produces an executable file (.exe)
• « After compilation the compiler does not need to be present for the
program to run
• « The program can be given to others without access to (source) code
• « Final program does not need to be re-compiled each time it is run
• Cross-compilation, the program can be compiled to run on different
platforms

© UCLES 2018 Page 11 of 11


MUHAMMAD ALI KHAN
PAGE 425

Cambridge International Examinations


Cambridge International Advanced Subsidiary and Advanced Level
* 3 4 1 3 6 3 1 8 8 5 *

COMPUTER SCIENCE 9608/13


Paper 1 Theory Fundamentals October/November 2018
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 14 printed pages and 2 blank pages.

DC (SC/SW) 144491/4
© UCLES 2018 [Turn over
MUHAMMAD ALI KHAN
PAGE 426

1 A product designer is creating a poster.

(a) The designer creates a 6-colour bitmap image for the poster as shown.

Each colour is represented by a letter, for example, R = red, B = blue.

R R P P P G

B R R P G G

B W B B O O

B W W P P O

B B R P G O

B R R P G O

(i) State the minimum number of bits needed to represent each pixel in the image in part (a).

.......................................................................................................................................[1]

(ii) Calculate the minimum file size of the image shown in part (a). Show your working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

File size .............................................................................................................................


[3]

(b) (i) The designer takes a photograph to put on the poster. The photograph has a resolution of
50 000 pixels by 50 000 pixels. The colours are represented using 4 bytes per pixel.

Estimate the file size of the photograph in gigabytes. Show your working.

Working ..............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Estimated file size ..............................................................................................................


[4]

© UCLES 2018 9608/13/O/N/18


MUHAMMAD ALI KHAN
PAGE 427

(ii) The photograph needs to be sent by email but the file size is too big. It needs to be
compressed.

The table lists several methods of making an image file size smaller.

Tick () one box on each row to indicate whether each method is lossy or lossless.

Compression method Lossy Lossless

Cropping the image

Reducing the resolution of the image

Using run-length encoding (RLE)

Reducing the colour depth of the image

[4]

(c) Explain how run-length encoding would compress the image in part (a).

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2018 9608/13/O/N/18 [Turn over


MUHAMMAD ALI KHAN
PAGE 428

2 The following table shows assembly language instructions for a processor which has one general
purpose register, the Accumulator (ACC) and an Index Register (IX).

Instruction
Explanation
Op code Operand
Direct addressing. Load the contents of the location at the given address
LDD <address>
to ACC.
Indexed addressing. Form the address from <address> + the contents of
LDX <address>
the Index Register. Copy the contents of this calculated address to ACC.
LDR #n Immediate addressing. Load the number n to IX.
STO <address> Store contents of ACC at the given address.
ADD <address> Add the contents of the given address to ACC.
INC <register> Add 1 to the contents of the register (ACC or IX).
DEC <register> Subtract 1 from the contents of the register (ACC or IX).
CMP <address> Compare contents of ACC with contents of <address>.
Following compare instruction, jump to <address> if the compare was
JPE <address>
True.
Following compare instruction, jump to <address> if the compare was
JPN <address>
False.
JMP <address> Jump to the given address.
OUT Output to the screen the character whose ASCII value is stored in ACC.
END Return control to the operating system.

(a) State what is meant by relative addressing and indexed addressing.

Relative addressing ...................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Indexed addressing ...................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2018 9608/13/O/N/18


MUHAMMAD ALI KHAN
PAGE 429

(b) The current contents of a general purpose register (X) are:

X 1 1 1 1 0 0 1 0

(i) The contents of X represent an unsigned binary integer.

Convert the value in X into denary.

.......................................................................................................................................[1]

(ii) The contents of X represent an unsigned binary integer.

Convert the value in X into hexadecimal.

.......................................................................................................................................[1]

(iii) 7KHFRQWHQWVRI;UHSUHVHQWDWZR·VFRPSOHPHQWELQDU\LQWHJHU

Convert the value in X into denary.

.......................................................................................................................................[1]

(iv) Show the result on the general purpose register (X) after the following instruction is run.

INC X

[1]

© UCLES 2018 9608/13/O/N/18 [Turn over


MUHAMMAD ALI KHAN
PAGE 430

(c) The current contents of the main memory, Index Register (IX) and selected values from the
ASCII character set are provided with a copy of the instruction set.

Address Instruction ASCII code table (selected codes only)


20 LDD 96 ASCII code Character
21 CMP 97 450 <
22 JPE 32 451 >
23 LDX 86 452 =
24 CMP 98 453 &
25 JPN 27 454 (
26 OUT 455 )
27 LDD 96 Instruction set
28 INC ACC Instruction
29 STO 96 Op Explanation
Operand
30 INC IX code

31 JMP 21 Direct addressing. Load the contents of


LDD <address>
the location at the given address to ACC.
32 END
Indexed addressing. Form the address
… from <address> + the contents of the
LDX <address>
Index Register. Copy the contents of this
93 453 calculated address to ACC.
94 453 Immediate addressing. Load the number
LDR #n
n to IX.
95 452
96 8 Store contents of ACC at the given
STO <address>
address.
97 10
Add the contents of the given address to
98 453 ADD <address>
ACC.
Add 1 to the contents of the register (ACC
INC <register>
or IX).
IX 8
Subtract 1 from the contents of the
DEC <register>
register (ACC or IX).
Compare contents of ACC with contents of
CMP <address>
<address>.
Following a compare instruction, jump to
JPE <address>
<address> if the compare was True.
Following a compare instruction, jump to
JPN <address>
<address> if the compare was False.
JMP <address> Jump to the given address.
Output to the screen the character whose
OUT
ASCII value is stored in ACC.
END Return control to the operating system.

© UCLES 2018 9608/13/O/N/18


MUHAMMAD ALI KHAN
PAGE 431

Complete the trace table for the given assembly language program.

Instruction Memory address


ACC IX OUTPUT
address 93 94 95 96 97 98
453 453 452 8 10 453 8
20

[7]

© UCLES 2018 9608/13/O/N/18 [Turn over


MUHAMMAD ALI KHAN
PAGE 432

3 This question presents three scenarios. Tick () one box for each scenario to indicate whether
\RXWKLQNWKHSHUVRQ·VEHKDYLRXULVHWKLFDORUXQHWKLFDO-XVWLI\\RXUFKRLFH

(a) Mason is using his work computer to book a holiday whilst at work.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Ethan is supervising a trainee. The trainee asks Ethan for a reference for another job. Ethan
does not want to lose the trainee, so refuses to give him a reference.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) Margarita finds that one of her team members has produced some inventive code. She
presents this to her manager, praising the individual by name.

Ethical
Unethical

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 9608/13/O/N/18


MUHAMMAD ALI KHAN
PAGE 433

4 Ava needs to view a website and she knows the Uniform Resource Locator (URL).

(a) Complete the series of steps that take place.

Write the letter of the appropriate statement in each space.

A DNS finds corresponding IP

B DNS looks up URL in table

C Ava types the URL into a web browser

1 ..................................................

2 Web browser sends URL to Domain Name Service (DNS)

3 ..................................................

4 ..................................................

5 DNS returns IP address to web browser


[2]

(b) (i) An IPv4 address has been entered as 12.258.3

Give two reasons why this IP address is invalid.

1 .........................................................................................................................................

...........................................................................................................................................

2 .........................................................................................................................................

...........................................................................................................................................
[2]

(ii) An IPv6 address has been entered as 15EF:5L63::2014:BB::60AA

Give two reasons why this IP address is invalid.

1 .........................................................................................................................................

...........................................................................................................................................

2 .........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2018 9608/13/O/N/18 [Turn over


MUHAMMAD ALI KHAN
PAGE 434

10

(c) The table shows four descriptions of IP addresses.

Tick () one box in each row to identify whether each description applies to a public or private
IP address.

Description Public Private


The address can be reached over the Internet.
The address is more secure.
The address can only be accessed through the same LAN.
The address can be duplicated in different networks.
[4]

© UCLES 2018 9608/13/O/N/18


MUHAMMAD ALI KHAN
PAGE 435

11

5 Arnold is a software developer. He has created a computer game for people to download over the
Internet. Arnold is considering releasing the game as a piece of commercial software.

(a) (i) Describe what is meant by a commercial licence.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Name and describe one other type of licence that Arnold can consider using.

Licence type .......................................................................................................................

Description .........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

(b) Users need to enter their name and email address to create an account. The information is
VWRUHGLQDGDWDEDVHRQ$UQROG·VFRPSXWHU

Give threeZD\VWKDW$UQROGFDQHQVXUHXVHUV·GHWDLOVDUHNHSWVHFXUH

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2018 9608/13/O/N/18 [Turn over


MUHAMMAD ALI KHAN
PAGE 436

12

6 The fetch-execute (FE) cycle uses special purpose registers.

(a) The stages in the FE cycle are shown in register transfer notation.

MAR [...............]

PC PC + 1

............... [ [MAR] ]

............... [MDR]

(i) The steps shown in part (a) are incomplete.

Write the missing register names in the spaces in part (a). [3]

(ii) The third instruction [ [MAR] ] has double brackets.

State the purpose of the double brackets.

...........................................................................................................................................

.......................................................................................................................................[1]

(b) One stage of the FE cycle includes checking for interrupts.

State what is meant by an interrupt.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) There are two types of RAM: dynamic RAM (DRAM) and static RAM (SRAM).

The following table shows five statements about DRAM and SRAM.

Tick () one box in each row to indicate whether the statement applies to DRAM or SRAM.

Statement DRAM SRAM

Does not need to be refreshed as the circuit holds the data while the power
supply is on

Mainly used in cache memory of processors where speed is important

Has less complex circuitry

Requires higher power consumption under low levels of access, which is


significant when used in battery-powered devices

Requires data to be refreshed occasionally so it retains the data


[5]
© UCLES 2018 9608/13/O/N/18
MUHAMMAD ALI KHAN
PAGE 437

13

7 The network manager of a Local Area Network (LAN) has replaced the Ethernet cables with a
wireless network.

(a) Give three benefits of a wireless network compared to a wired network.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

(b) Give one drawback of a wireless network compared to a wired network.

...................................................................................................................................................

...............................................................................................................................................[1]

© UCLES 2018 9608/13/O/N/18 [Turn over


MUHAMMAD ALI KHAN
PAGE 438

14

8 (a) Draw a logic circuit to represent the logic expression:

X = (A XOR B) OR (NOT(C AND A))

B X

[4]

(b) Complete the truth table for the logic expression in part (a).

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1

[4]

© UCLES 2018 9608/13/O/N/18


MUHAMMAD ALI KHAN
PAGE 439

Cambridge Assessment International Education


Cambridge International Advanced Subsidiary and Advanced Level

COMPUTER SCIENCE 9608/13


Paper 1 Written Paper October/November 2018
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 10 printed pages.

© UCLES 2018 [Turn over


MUHAMMAD ALI KHAN
PAGE 440
9608/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2018 Page 2 of 10


MUHAMMAD ALI KHAN
PAGE 441
9608/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

1(a)(i) 3 1

1(a)(ii) 1 mark per bullet point 3

• Number of pixels: 6 × 6 = 36
• Number of bits: Number of pixels (36) × 3
• 108ௗbitsௗ/ௗ13.5ௗbytes

1(b)(i) 1 mark per bullet point 4

• Number of pixels: 50ௗ000 × 50ௗ000 = 2ௗ500ௗ000ௗ000


• Number of bytes: Number of pixels (2ௗ500ௗ000ௗ000) × 4 //
10ௗ000ௗ000ௗ000ௗ //
Number of bits: Number of pixels (2 500 000 000) × 32 //
80 000 000 000
• Conversion to gigabytes
• 10ௗGBௗ/ௗ9.3ௗGB

1(b)(ii) 1 mark for correct tick in each row. 4

Compression method Lossy Lossless

Cropping the image 9

Reducing the resolution of the image 9

Using run-length encoding (RLE) 9

Reducing the colour depth of the image 9

1(c) 1 mark per bullet point to max 3 3

• Looks for runs of consecutive pixel of the same colour


• Stores the colour value once and the number of times it occurs
• Lossless method of compression
• Reference to the given image in context

Question Answer Marks

2(a) 1 mark per bullet point 2

Relative addressing:
• A number (the offset) is added to the base address to give the actual
address

Indexed addressing:
• The contents of the index register are added to operand to give the actual
address

2(b)(i) 242 1

© UCLES 2018 Page 3 of 10


MUHAMMAD ALI KHAN
PAGE 442
9608/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

2(b)(ii) F2 1

2(b)(iii) –14 1

2(b)(iv) 1 1 1 1 0 0 1 1 1

2(c) 1 mark per bullet point 7

• Loading 8 (instruction 20)


• Comparison and loading 453 (instructions 21–23)
• Outputting & (instruction 26)
• Loading, incrementing and storing in 96 (instructions 27–29)
• Incrementing Index Register (instruction 30)
• Jumping and loading 452 (instruction 23)
• Jumping, loading, incrementing, storing in 96, incrementing IX and end
(instructions 24–32)

© UCLES 2018 Page 4 of 10


MUHAMMAD ALI KHAN
PAGE 443
9608/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Instruction Memory address


IX OUTPUT
address ACC
93 94 95 96 97 98

453 453 452 8 10 453 8

20 8

21

22

23 453

24

25

26 &

27 8

28 9

29 9

30 9

31

21

22

23 452

24

25

27 9

28 10

29 10

30 10

31

21

22

32

© UCLES 2018 Page 5 of 10


MUHAMMAD ALI KHAN
PAGE 444
9608/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

3(a) Either Ethical 2

• He is booking the holiday in his own time / lunchtime // he is self-employed


• He has been given permission
• Reference to IEEE in context

Or Unethical

• Should not use company computer for personal use


• Should be working whilst at work
• Reference to IEEE in context

3(b) Unethical: Max 2 marks from 2

• Company will get a bad reputation


• Should be supporting his colleague
• Reference to IEEE in context

3(c) Either Ethical 2

• She is supporting her colleague


• Working in the best interests of the company
• Reference to IEEE in context

Or Unethical

• Praising one team member instead of the whole team


• Others in the team may also have contributed, so she is not being
supportive of the whole team
• Reference to IEEE in context

Question Answer Marks

4(a) 1 mark for 1 letter in correct space 2


2 marks for all 3 letters in correct places

1 C
2 URL goes to Domain Name Service (DNS)
3 B
4 A
5 DNS returns IP address to client

4(b)(i) 1 mark per bullet point 2

• 258 is too large/largest individual numbers is 255


• 4 numbers needed/1 number missing/only 3 groups of numbers given

© UCLES 2018 Page 6 of 10


MUHAMMAD ALI KHAN
PAGE 445
9608/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

4(b)(ii) 1 mark per bullet point 2

• L not a valid hexadecimal number


• Only one double colon is allowed

4(c) 1 mark per row 4

Description Public Private

The address can be reached over the Internet. 9

The address is more secure. 9

The address can only be accessed through the same 9


LAN.

The address can be duplicated in different networks. 9

Question Answer Marks

5(a)(i) 1 mark per bullet point, max 2 2

• Restricted use
• Source code not provided // source code protected
• Anyone can purchase/download if agree to the terms
• Limited number of installations allowed // Software key needed to install

5(a)(ii) 1 mark for name and 2 marks for description 3

Either
Open Source
• The source code is released with the program
• Users can change / edit the source code to enhance the game
• Users can re-release the game under the same terms // the game might
spread more easily

Or
Shareware
• Users get free trial or limited access for set time
• Users do not have access to the source code // source code may not be
edited
• At end of trial period, users may have to pay or register to continue using
the game // Can get people ‘hooked’ and then charge a fee
Or
Freeware
• There is no fee for the game
• The game could be copyrighted
• Modification, re-distribution or reverse engineering of the game without
permission is prohibited

© UCLES 2018 Page 7 of 10


MUHAMMAD ALI KHAN
PAGE 446
9608/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

5(b) 1 mark per bullet point, max 3 3

• Firewall / proxy
• Encryption
• Username and Password
• Physical security
• Biometric authentication // by example
• Two-step authentication // by example
• Anti-malware

Question Answer Marks

6(a)(i) MAR m [PC] 3


PC m PC + 1
MDR m [ [MAR] ]
CIR m [MDR]

6(a)(ii) 1 mark from: 1


• The contents of the MAR is an address, it is the contents of that address
which is transferred to MDR
• The contents of the address pointed to by the MAR is transferred to the
MDR

6(b) 1 mark per bullet point to max 2 2

• A signal from a source / device


• Telling the processor its attention is needed

6(c) 1 mark per row 5

Statement DRAM SRAM

Does not need to be refreshed as the circuit holds the data 3


while the power supply is on

Mainly used in cache memory of processors where speed is 3


important

Has less complex circuitry 3

Requires higher power consumption under low levels of 3


access, which is significant when used in battery-powered
devices

Requires data to be refreshed occasionally so it retains the 3


data

© UCLES 2018 Page 8 of 10


MUHAMMAD ALI KHAN
PAGE 447
9608/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

7(a) 1 mark per benefit to max 3 3

• Devices can be more mobile as they do not have to be connected to cable


• Easier to set up // no cables need to be installed
• Add additional devices is easier
• Many different types of device can be connected at the same time

7(b) 1 mark for a drawback from the following: 1

• Easier to hack
• Interference
• Signal degrades quickly

Question Answer Marks

8(a) 1 mark for each logic gate with the correct inputs 4

© UCLES 2018 Page 9 of 10


MUHAMMAD ALI KHAN
PAGE 448
9608/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

8(b) One mark for each correct pair of lines 4

Working Space
A B C X

0 0 0 1

0 0 1 1

0 1 0 1

0 1 1 1

1 0 0 1

1 0 1 1

1 1 0 1

1 1 1 0

© UCLES 2018 Page 10 of 10


MUHAMMAD ALI KHAN
PAGE 449

Cambridge Assessment International Education


Cambridge International Advanced Subsidiary and Advanced Level
* 1 0 3 1 1 0 2 9 2 8 *

COMPUTER SCIENCE 9608/11


Paper 1 Theory Fundamentals May/June 2019
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 13 printed pages and 3 blank pages.

DC (SC) 163548/3
© UCLES 2019 [Turn over
MUHAMMAD ALI KHAN
PAGE 450

1 Devices connected to the Internet have IP (Internet Protocol) addresses.

(a) Three IPv4 addresses are given.

Circle either Valid or Invalid to indicate whether each address is valid or invalid. Explain your
decision.

Address 1: 3A.21.2H.1 Valid / Invalid

Explanation ...............................................................................................................................

...................................................................................................................................................

Address 2: 299.53.2.2 Valid / Invalid

Explanation ...............................................................................................................................

...................................................................................................................................................

Address 3: 192.2.1.0 Valid / Invalid

Explanation ...............................................................................................................................

...................................................................................................................................................
[3]

(b) A website can be accessed using either the Uniform Resource Locator (URL) or the IP
address.

Describe how a URL is converted into its matching IP address.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(c) People use the Internet to stream media.

Complete the following statements by filling in the names of the missing methods of bit
streaming.

................................................. bit streaming is used when watching a live stream of events


that are currently taking place. The event is captured live with a video camera connected to a
computer, and it cannot be paused or rewound.

................................................. bit streaming is used when watching an event that has taken
place in the past. Existing media are encoded to bit streaming format and uploaded to a
server. It can be paused and rewound.
[2]
© UCLES 2019 9608/11/M/J/19
MUHAMMAD ALI KHAN
PAGE 451

(d) A recording of a concert is stored as a file. The file is compressed using lossy compression
before it is streamed to users.

(i) State why this file needs to be compressed.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Define the term lossy compression.

...........................................................................................................................................

..................................................................................................................................... [1]

(iii) The file could be compressed using lossless compression.

Explain why lossy compression is a more appropriate compression technique than


lossless for this file.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

© UCLES 2019 9608/11/M/J/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 452

2 A software company produces software and distributes it under different software licences.

(a) Four descriptions of software licences are given.

Write the type of software licence that best fits each description. Use a different type of licence
for each description.

1. The software can be legally used, only after a fee has been paid.

Licence type .............................................................................................................................

2. The source code comes with the software. If the software is modified, the edited source
code must be released under the same conditions as the original software.

Licence type .............................................................................................................................

3. The software is free for a trial period and then a fee is requested, or expected, if the user
wants to continue to use the software.

Licence type .............................................................................................................................

4. The source code comes with the software. The software is free to be downloaded, edited,
and distributed, possibly without restriction.

Licence type .............................................................................................................................


[4]

(b) The software company stores information about customers and the software licences they
have purchased. The company considers a file-based approach for the storage and retrieval
of data.

(i) Give three limitations of a file-based approach to store the data.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2019 9608/11/M/J/19


MUHAMMAD ALI KHAN
PAGE 453

(ii) The software company decides to use a database to overcome the limitations of a
file-based system. Some of these limitations are addressed through the logical schema.

Name and describe two levels of the schema of a database.

Name 1 ..............................................................................................................................

Description ........................................................................................................................

...........................................................................................................................................

Name 2 ..............................................................................................................................

Description ........................................................................................................................

...........................................................................................................................................
[4]

© UCLES 2019 9608/11/M/J/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 454

(c) The database has the following tables:

CUSTOMER(CustomerID, CompanyName)

SOFTWARE(SoftwareID, SoftwareName, OperatingSystem, Description)

LICENCE(LicenceID, CustomerID, SoftwareID, DateOfPurchase,


LicenceType, Cost, ExpiryDate)

(i) Identify the type of relationship that exists between the tables CUSTOMER and LICENCE.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Describe how the relationship is created between the tables CUSTOMER and LICENCE.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) The company needs a list of all software licences that have an expiry date on or before
31/12/2019.

Write an SQL query to return the fields CustomerID, SoftwareID, LicenceType,


Cost and ExpiryDate for all licences that expire on, or before 31/12/2019. Group the
output by CustomerID, and in ascending order of cost.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

© UCLES 2019 9608/11/M/J/19


MUHAMMAD ALI KHAN
PAGE 455

3 Kimmy has written a program in a high-level language.

(a) Kimmy has used library routines in the program.

(i) Describe two advantages of using library routines in the program.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

(ii) Describe what is meant by a Dynamic Link Library (DLL).

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(b) Three translators are compilers, interpreters, and assemblers.

(i) State one benefit of Kimmy using an interpreter during the development of the program.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) State three benefits of Kimmy using a compiler when the program is complete.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2019 9608/11/M/J/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 456

4 A software developer works in a team for a large software development company.

(a) Two principles of the ACM/IEEE Software Engineering Code of Ethics are:

• developers must act consistently with the public interest


• developers must act in the best interest of their client and employer.

Name and describe three other principles in the ACM/IEEE Software Engineering Code of
Ethics.

Principle 1 .................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Principle 2 .................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Principle 3 .................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

(b) The software development company uses data backup and disk-mirroring to keep their data
secure.

Explain how data backup and disk-mirroring allow the company to recover from data loss.

Data backup .............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Disk-mirroring ...........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]
© UCLES 2019 9608/11/M/J/19
MUHAMMAD ALI KHAN
PAGE 457

5 A simple program written in assembly language is translated using a two-pass assembler.

(a) The table contains some of the tasks performed by a two-pass assembler.

Tick () one box in each row to indicate whether the task is performed at the first or second
pass. The first row has been completed for you.

Task First pass Second pass


Creation of symbol table 
Expansion of macros
Generation of object code
Removal of comments
[2]

(b) 7KHSURFHVVRU·VLQVWUXFWLRQVHWFDQEHJURXSHGDFFRUGLQJWRWKHLUIXQFWLRQ)RUH[DPSOHRQH
group is modes of addressing.

Identify two other groups of instructions.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2019 9608/11/M/J/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 458

10

(c) The table shows assembly language instructions for a processor which has one general
purpose register, the Accumulator (ACC), and an Index Register (IX).

Instruction
Explanation
Op code Operand
LDM #n Immediate addressing. Load the denary number n to ACC.
Direct addressing. Load the contents of the location at the given address to
LDD <address>
ACC.
Indexed addressing. Form the address from <address> + the contents of the
LDX <address>
Index Register. Copy the contents of this calculated address to ACC.
LDR #n Immediate addressing. Load the denary number n to IX.
STO <address> Store contents of ACC at the given address.
ADD <address> Add the contents of the given address to ACC.
INC <register> Add 1 to the contents of the register (ACC or IX).
CMP #n Compare contents of ACC with denary number n.
JPE <address> Following a compare instruction, jump to <address> if the compare was True.
JPN <address> Following a compare instruction, jump to <address> if the compare was False.
JMP <address> Jump to the given address.
OUT Output to screen the character whose ASCII value is stored in ACC.
END Return control to the operating system.

The current contents of the main memory, Index Register (IX) and selected values from the
ASCII character set are:

Address Instruction ASCII code table (Selected codes only)


20 LDM #0 ASCII Code Character
21 STO 300
22 CMP #0 65 A
23 JPE 28 66 B
24 LDX 100 67 C
25 ADD 301
26 OUT 68 D
27 JMP 30 69 E
28 LDX 100 97 a
29 OUT
30 LDD 300 98 b
31 INC ACC 99 c
32 STO 300 100 d
33 INC IX
101 e
34 CMP #2
35 JPN 22
36 END

100 65
101 67
102 69
103 69
104 68

300
301 33

IX 0
© UCLES 2019 9608/11/M/J/19
MUHAMMAD ALI KHAN
PAGE 459

11

Trace the program currently in memory using the following trace table. The first instruction
has been completed for you.

Instruction Memory address


ACC IX OUTPUT
address 100 101 102 103 104 300 301

65 67 69 69 68 33 0

20 0

[8]

© UCLES 2019 9608/11/M/J/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 460
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

1(a) 1 mark for each correct indication and explanation 3

3A.21.2H.1 Invalid
H is not a valid hexadecimal digit

299.53.2.2 Invalid
299 is not in the correct range

192.2.1.0 Valid
Consists of four numbers in the range 0–255 separated by
full stops

1(b) 1 mark per bullet point to max 3 3

URL is parsed to obtain the Domain name


Domain name is sent to the nearest Domain Name Server (DNS)
DNS holds a list of Domain names and matching IP addresses
DNS name resolver searches its database for the Domain name
If DNS does not find the Domain name, the request is forwarded to a
higher level DNS
If the Domain name is found, the IP address is returned
If the Domain name is not found, the request is passed to a higher level
server
If the Domain name is finally not found, an error message is generated

1(c) 1 mark for each correct term 2

Real-time

On-demand

1(d)(i) 1 mark per bullet point to max 1 1

The data files are very large


It would take a long time to send the uncompressed file // Compressed
files will download faster
A higher bandwidth would be needed to transmit the uncompressed file

1(d)(ii) 1 mark per bullet point to max 1 1

Data is lost
The decompressed file is not the same as the original

1(d)(iii) 1 mark per bullet point to max 3 3

Lossy creates a smaller file than lossless // lossy compresses further


than lossless
The recording of the concert is a large file size and needs significant
reduction in size
Lossy removes detail which can be lost without people noticing
By example e.g. reduction in sound quality will not be noticed

© UCLES 2019 Page 3 of 9


MUHAMMAD ALI KHAN
PAGE 461
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

2(a) 1 mark for each correct term 4

Commercial Licence
Free Software Licence
Shareware Licence
Open Source Licence

2(b)(i) 1 mark per bullet point to max 3 3

Data redundancy // data is repeated in more than one file


Data dependency // changes to data means changes to programs
accessing that data
Lack of data integrity // entries that should be the same can be different
in different places
Lack of data privacy // all users have access to all data if a single flat file

2(b)(ii) 1 mark for each correct name, 1 mark for each matching description, max 2 4
marks per level

External
The individual’s view(s) of the database

Conceptual
Describes the data as seen by the applications making use of the
DBMS
Describes the ‘views’ which users of the database might have

Physical / Internal
Describes how the data will be stored on the physical media

Logical
Describes how the relationships will be implemented in the logical
structure of the database

2(c)(i) 1-to-many // 1 customer to/has many licences 1

2(c)(ii) 1 mark per bullet point 2

CustomerID is the Primary key in CUSTOMER table


Links to CustomerID as a Foreign key in LICENCE table

© UCLES 2019 Page 4 of 9


MUHAMMAD ALI KHAN
PAGE 462
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

2(c)(iii) 1 mark per bullet point 5

Select with correct 5 fields


From LICENCE
Where ExpiryDate <= '31/12/2019' (any appropriate date type)
Group by CustomerID
Order by Cost (with or without ASC, but not DESC)

SELECT CustomerID, SoftwareID, LicenceType,


Cost, ExpiryDate
FROM LICENCE
WHERE ExpiryDate <= '31/12/2019'
GROUP BY CustomerID ORDER BY Cost;

Question Answer Marks

3(a)(i) 1 mark for each advantage, 1 mark for a valid expansion to max 2 2 4

Code is already tested


«so it is more robust/likely to work

Saves programming time


«code does not have to be written/re-written from scratch

The programmer can use e.g. mathematical functions


«that s/he may not know how to code

If there is an improvement in the library routine


«the program updates automatically

3(a)(ii) 1 mark per bullet point to max 2 2

A collection of self-contained (shared library) programs


«that are already compiled
Linked to the main program during execution
Library program code is separate from the .EXE file
Library file only loaded into memory when required at run time
A DLL file can be made available to several applications (at the same
time)
If DLL routine is updated the program that uses it will run the update

3(b)(i) 1 mark per bullet point to max 1 1

Errors can be corrected as they occur


Can run a partially complete program when developing
The effect of any change made to the code can be seen immediately

© UCLES 2019 Page 5 of 9


MUHAMMAD ALI KHAN
PAGE 463
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

3(b)(ii) 1 mark per bullet point to max 3 3

Produces an executable file


User does not have access to source code
It will (probably) be faster to run the executable
Code does not have to be compiled each time it is run
Does not need the compiler to be present at run-time

Question Answer Marks

4(a) 1 mark for naming a principle, 1 mark for description to max 3 2 6

Product
Software engineers shall ensure that their products and related
modifications meet the highest professional standards possible.

Judgement
Software engineers shall maintain integrity and independence in their
professional judgement.

Management
Software engineering managers and leaders shall subscribe to and
promote an ethical approach to the management of software
development and maintenance.

Profession
Software engineers shall advance the integrity and reputation of the
profession consistent with the public interest.

Colleagues
Software engineers shall be fair to and supportive of their colleagues.

Self
Software engineers shall participate in life-long learning regarding the
practice of their profession and shall promote an ethical approach to the
practice of the profession.

4(b) 1 mark per bullet point to max 2 2 4

Data backup
A copy of data will have been made and stored elsewhere.
If the original is lost, the backup can be used to restore the data.

Disk-mirroring
The data is stored on two disks simultaneously.
If the first disk drive fails, the data is accessed from the second disk.

© UCLES 2019 Page 6 of 9


MUHAMMAD ALI KHAN
PAGE 464
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

5(a) 1 mark for two correct ticks, 2 marks for three correct ticks 2

Task First pass Second pass

Creation of symbol table ‫ض‬

Expansion of macros ‫ض‬

Generation of object code ‫ض‬

Removal of comments ‫ض‬

5(b) 1 mark per bullet point to max 2 2

Data movement
Input and output of data
Arithmetic operations
Jump instructions
Compare instructions

5(c) 1 mark per bullet point 8

Storing 0 in 300 (line 21)


Loading 65 (line 28)
Outputting A (line 29)
Loading 0 (line 30), incrementing ACC (line 31) and storing in 300
(line 32)
Incrementing IX (line 33)
Loading 67 (line 24) and adding 33 (line (25)
Outputting d (line 26)
Loading 1 (line 30), incrementing ACC (line 31), storing in 300 (line 32)
and incrementing IX (line 33)

© UCLES 2019 Page 7 of 9


MUHAMMAD ALI KHAN
PAGE 465
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Memory address
Instruction
IX OUTPUT
address ACC 100 101 102 103 104 300 301

65 67 69 69 68 33 0

20 0

21 0

22

23

28 65

29 A

30 0

31 1

32 1

33 1

34

35

22

24 67

25 100

26 d

27

30 1

31 2

32 2

33 2

34

36

© UCLES 2019 Page 8 of 9


MUHAMMAD ALI KHAN
PAGE 466
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

6(a) 1 mark per bullet point to max 3 3

The data from a single frame is split into two separate fields
One field has data for the odd numbered rows/lines and the other field
has data for the even numbered rows/lines
Odd numbered line fields alternate with even numbered line fields
The viewer sees data from two frames simultaneously

6(b) 1 mark per bullet point to max 1 1

Produces what appears to be a higher refresh rate


Lower bandwidth needed // Halves the bandwidth requirements

6(c) 1 mark per bullet point to max 2 2

Identifies pixels that do not change between frames


Records only the differences between the frames

6(d)(i) 1 mark per bullet point to max 3 3

The amplitude of the wave is measured /sound wave is sampled


At set/regular time intervals
Each sample is stored as a binary number
Samples are stored in order in a file

6(d)(ii) 1 mark per bullet point to max 1 for each 2

Sample rate:
Increasing the sample rate means more samples per second hence
more bits per second and larger file size
Decreasing the sample rate means fewer samples per second hence
fewer bits per second and smaller file size

Sample resolution:
A higher sampling resolution means more bits per sample and a larger
file size
A lower sampling resolution means fewer bits per sample. a smaller file
size

© UCLES 2019 Page 9 of 9


MUHAMMAD ALI KHAN
PAGE 467

Cambridge Assessment International Education


Cambridge International Advanced Subsidiary and Advanced Level
* 0 2 5 0 7 8 0 7 6 8 *

COMPUTER SCIENCE 9608/12


Paper 1 Theory Fundamentals May/June 2019
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 13 printed pages and 3 blank pages.

DC (SC) 163549/4
© UCLES 2019 [Turn over
MUHAMMAD ALI KHAN
PAGE 468

1 Computers on the Internet have IP addresses.

(a) IP addresses can be in either IPv4 or IPv6 format.

(i) Give an example of a valid IPv4 address.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) State why there is a need for IPv6 addressing.

...........................................................................................................................................

..................................................................................................................................... [1]

(iii) $FRPSXWHU·V,3YDGGUHVVLV

&$$$$
Explain why this IPv6 address would be an invalid IPv4 address.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(b) A company has computers in two separate buildings that communicate using the Internet
over a Public Switched Telephone Network (PSTN).

(i) Describe the transmission of data using a PSTN.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) The company wants to install a dedicated line between the two buildings.

Identify one benefit and one drawback of installing a dedicated line between the two
buildings.

Benefit ...............................................................................................................................

...........................................................................................................................................

Drawback ..........................................................................................................................

...........................................................................................................................................
[2]
© UCLES 2019 9608/12/M/J/19
MUHAMMAD ALI KHAN
PAGE 469

(c) A network can use routers and gateways.

Explain the role of routers and gateways in a network.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(d) The company has an email server.

Identify three other types of server.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2019 9608/12/M/J/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 470

2 Biyu is writing a computer program in a high-level language.

(a) Biyu uses a language translator.

(i) State the purpose of a language translator.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Biyu uses an interpreter.

State two benefits of Biyu using an interpreter instead of a compiler while writing the
program.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(iii) Name a translator other than an interpreter and a compiler.

..................................................................................................................................... [1]

(b) Biyu uses library files in the program.

Explain why software is often developed using library files.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 9608/12/M/J/19


MUHAMMAD ALI KHAN
PAGE 471

3 The fetch-execute cycle is shown in register transfer notation.

01 MAR [PC]

02 PC [PC] - 1

03 MDR [MAR]

04 CIR [MAR]

(a) There are three errors in the fetch-execute cycle shown.

Identify the line number of each error and give the correction.

Line number ..............................................................................................................................

Correction .................................................................................................................................

Line number ..............................................................................................................................

Correction .................................................................................................................................

Line number ..............................................................................................................................

Correction .................................................................................................................................
[3]

(b) $SURFHVVRU·VLQVWUXFWLRQVHWFDQEHJURXSHGDFFRUGLQJWRWKHLUIXQFWLRQ)RUH[DPSOHRQH
group is the input and output of data.

Identify two other groups of instructions.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2019 9608/12/M/J/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 472

(c) The following table shows assembly language instructions for a processor which has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).

Instruction
Explanation
Op code Operand
LDM #n Immediate addressing. Load the denary number n to ACC
Direct addressing. Load the contents of the location at the given address to
LDD <address>
ACC
Indexed addressing. Form the address from <address> + the contents of the
LDX <address>
Index Register. Copy the contents of this calculated address to ACC
LDR #n Immediate addressing. Load the denary number n to IX
STO <address> Store contents of ACC at the given address
ADD <address> Add the contents of the given address to ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP #n Compare contents of ACC with denary number n
JPE <address> Following a compare instruction, jump to <address> if the compare was True
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
OUT Output to the screen the character whose ASCII value is stored in ACC
END Return control to the operating system

The current contents of the main memory, Index Register (IX) and selected values from the
$6&,,FKDUDFWHUVHWDUH

Address Instruction ASCII code table (Selected codes only)


50 LDM #0 ASCII code Character
51 STO 401
65 A
52 LDX 300
66 B
53 CMP #0
54 JPE 62 67 C
55 ADD 400 68 D
56 OUT 69 E
57 LDD 401
58 INC ACC
59 STO 401
60 INC IX
61 JMP 52
62 END

300 2
301 5
302 0
303 4

400 64
401

IX 0
© UCLES 2019 9608/12/M/J/19
MUHAMMAD ALI KHAN
PAGE 473

Trace the program currently in memory using the following trace table.
The first instruction has been completed for you.

Instruction Memory address


ACC IX OUTPUT
address 300 301 302 303 400 401

2 5 0 4 64 0

50 0

[8]

© UCLES 2019 9608/12/M/J/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 474

(d) 7KH$6&,,FKDUDFWHUFRGHIRU¶$·LVLQGHQDU\

(i) &RQYHUWWKHGHQDU\$6&,,FKDUDFWHUFRGHIRU¶$·LQWRELWELQDU\

[1]

(ii) &RQYHUWWKHGHQDU\$6&,,FKDUDFWHUFRGHIRU¶$·LQWRKH[DGHFLPDO

..................................................................................................................................... [1]

(iii) 7KH8QLFRGHFKDUDFWHUFRGHIRU¶*·LVLQKH[DGHFLPDO

6WDWHLQKH[DGHFLPDOWKH8QLFRGHFKDUDFWHUFRGHIRU¶'·

..................................................................................................................................... [1]

© UCLES 2019 9608/12/M/J/19


MUHAMMAD ALI KHAN
PAGE 475

4 Shazia is creating a computer program that will be released to the public. The program includes a
video.

(a) Shazia uses a microphone to record a sound track for the video.

(i) Describe the internal operation of a microphone.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) The script for the sound track is printed using a laser printer.

Describe the internal operation of a laser printer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(b) The video is recorded using progressive encoding.

Describe progressive encoding.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 9608/12/M/J/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 476

10

(c) 6KD]LD·VFRPSXWHUKDV'\QDPLF5$0 '5$0 DQG6WDWLF5$0 65$0 

Explain the differences between Dynamic RAM and Static RAM.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(d) Shazia wants to make sure her computer program is copyrighted.

(i) Define the term copyright.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Shazia does not want to release the software as open source.

Explain why Shazia does not want to use an open source licence.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) Name and describe two software licences, other than open source that Shazia could
use.

Licence 1 ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Licence 2 ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2019 9608/12/M/J/19


MUHAMMAD ALI KHAN
PAGE 477

11

5 Moheem is creating a relational database to store data about his customers.

(a) Moheem has been told a relational database addresses some of the limitations of a file-based
approach by reducing data redundancy.

(i) State what is meant by the term data redundancy.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Explain how a relational database can help to reduce data redundancy.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(b) Moheem uses a Database Management System (DBMS) to ensure the security and integrity
of the data.

(i) Explain the difference between security and integrity.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Name and describe two security features provided by a DBMS.

Feature 1 ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Feature 2 ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]
© UCLES 2019 9608/12/M/J/19 [Turn over
MUHAMMAD ALI KHAN
PAGE 478

12

(iii) The DBMS provides software tools for the database developer.

Fill in the names of the missing software tools in the following statements.

A ..................................................................... allows a developer to extract data from a


database.

A ..................................................................... enables a developer to create user-friendly


forms and reports.
[2]

© UCLES 2019 9608/12/M/J/19


MUHAMMAD ALI KHAN
PAGE 479

13

6 (a) 'UDZDORJLFFLUFXLWWRUHSUHVHQWWKHORJLFH[SUHVVLRQ

X = A OR (B AND NOT C) OR (A AND B)

B X

[5]

(b) Complete the truth table for the logic expression in part (a).

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2019 9608/12/M/J/19


MUHAMMAD ALI KHAN
PAGE 480

Cambridge Assessment International Education


Cambridge International Advanced Subsidiary and Advanced Level

COMPUTER SCIENCE 9608/12


Paper 1 Written Paper May/June 2019
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.

This document consists of 11 printed pages.

© UCLES 2019 [Turn over


MUHAMMAD ALI KHAN
PAGE 481
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2019 Page 2 of 11


MUHAMMAD ALI KHAN
PAGE 482
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

1(a)(i) 1 mark for any valid example 1

e.g. 192.168.0.1

1(a)(ii) 1 mark for correct answer 1

The number of IP addresses needed will exceed the number available using
IPv4.

1(a)(iii) 1 mark per bullet point to max 2 2

• Too many digits per group


• Too many groups of digits
• The address is more than 32ௗbits / 4ௗbytes
• Colons are used as separators

1(b)(i) 1 mark per bullet point to max 2 2

• The PSTN consists of many different types of communication lines


• Data is transmitted in both directions at the same time // (full) duplex
data transmission
• The communication passes through different switching centres

1(b)(ii) 1 mark for benefit, 1 mark for drawback 2

Benefit
• (Probably) faster connection / communication / transmission of data
• (Usually) more consistent transmission speed
• Improved security

Drawback
• Expensive to set-up / maintain
• Disruption to the dedicated line would leave no alternative

© UCLES 2019 Page 3 of 11


MUHAMMAD ALI KHAN
PAGE 483
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

1(c) 1 mark per bullet point to max 4, max 3 for router, max 3 for gateway 4
Only award the repeated bullet points (1 to 5 in each section) once

Router:
• Connects two (or more) networks
• Can connect a network to a WAN // acts as the single access point
for«
• Receives packets and forwards towards the destination
• «using the IP address of the destination
• Assigns private IP addresses
• Operates between similar networks // networks using the same protocol
• Can be used to segment a network

Gateway:
• Connect two (or more) networks
• Can connect a network to a WAN // acts as the single access point
for«
• Receives packets and send packets towards the destination
• «using the IP address of the destination
• Assigns private IP addresses
• Connects two dissimilar networks // networks that use different
protocols

1(d) 1 mark per bullet point to max 3 for any valid answer 3

For example:
• File server
• Print server
• Proxy server
• Web server
• Application server

Question Answer Marks

2(a)(i) 1 mark for correct answer 1

• To convert a (higher level) programming language to a different form

2(a)(ii) 1 mark per bullet point to max 2 2

• Easier de-bugging
• «because errors can be corrected in real time
• The effect of any change made to the code can be seen immediately
• Parts of the program can be tested, without all the program code being
available

2(a)(iii) 1 mark for correct answer 1

Assembler

© UCLES 2019 Page 4 of 11


MUHAMMAD ALI KHAN
PAGE 484
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

2(b) 1 mark per bullet point to max 2 2

• The code is already written so the programmer is not starting over again
which saves time
• The code will have been used by many people so it should be already
thoroughly tested and relatively error-free / won’t need re-testing
• The programmer can use e.g. mathematical / graphics functions etc.
that he may not know how to code
• Use of named library functions can simplify the program and make it
easier to read
• The library routine code should conform to industry standards and
therefore contribute towards a more robust program

Question Answer Marks

3(a) 1 mark for each error and correction 3

• Line 02 should be +1 not í1 // PC m [PC] + 1


• Line 03 should be double brackets around MAR //
MDR m [[MAR]]
• Line 04 should be MDR not MAR // CIR m [MDR]

3(b) 1 mark for each group to max. 2 2

• Data movement
• Arithmetic operations
• (Unconditional and conditional) jump instructions
• Compare instructions
• Modes of addressing

3(c) 1 mark per bullet 8

• Storing 0 in 401 (line 51)


• Loading memory location 300, value 2 to ACC (line 52)
• Adding 64 to ACC to give 66 (line 55)
• Outputting B (line 56)
• Load 0 (line 57), increment ACC (line 58) and store 1 in 401 (line 59)
• Incrementing IX (line 60)
• Loading 5 (line 52), adding 64 (line 55), outputting E (line 56) loading 1
(line 57), incrementing ACC (line 58), storing 2 in 401 (line 59) and
incrementing IX (line 60)
• Load 0 (line 52) and end

© UCLES 2019 Page 5 of 11


MUHAMMAD ALI KHAN
PAGE 485
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Instruction Memory address


ACC IX OUTPUT
address 300 301 302 303 400 401
2 5 0 4 64 0
50 0
51 0 [1]
52 2 [1]
53
54
55 66 [1]
56 B [1]
57 0
[1]
58 1
59 1
60 1 [1]
61
52 5
53
54
55 69
56 E [1]
57 1
58 2
59 2
60 2
61
52 0
53
[1]
54
62

© UCLES 2019 Page 6 of 11


MUHAMMAD ALI KHAN
PAGE 486
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

3(d)(i) 1 mark for correct answer 1

0100 0001

3(d)(ii) 1 mark for correct answer 1

41

3(d)(iii) 1 mark for correct answer 1

0044

Question Answer Marks

4(a)(i) 1 mark per bullet point to max 3 3

• The microphone has a diaphragm / ribbon (accept equivalent)


• The incoming sound waves cause vibrations (of the diaphragm)
• «causing a coil to move past a magnet (dynamic microphone) //
changing the capacitance (condenser microphone) // deforms the
crystal (crystal microphone) etc.
• An electrical signal is produced

4(a)(ii) 1 mark per bullet to max 3 3

• The revolving drum is initially given an electrical charge


• A laser beam (bounces off moving mirrors) scans back and forth across
the drum
• ...discharging certain points (i.e. ‘drawing’ the letters and images to be
printed as a pattern of electrical charges)
• The drum is coated with oppositely charged toner (which only sticks to
charged areas)
• The drum rolls over electro-statically charged paper // Electro-statically
charged paper is fed (towards the drum)
• The ‘pattern’ on the drum is transferred to the paper
• The paper is passed through the fuser to seal the image
• The electrical charge is removed from the drum // the excess toner is
collected

4(b) 1 mark per bullet to max 2 2

• Stores all the scan lines for an entire frame // displays / records all the
frame data at the same time // not split into fields
• Complete frames are displayed in sequence
• The rate of picture display is the same as the frame rate.

© UCLES 2019 Page 7 of 11


MUHAMMAD ALI KHAN
PAGE 487
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

4(c) 1 mark per bullet to max 4 4

• DRAM has to be refreshed / charged and SRAM does not require a


refresh
• DRAM uses a single transistor and capacitor and SRAM uses more
than one transistor
• DRAM stores each bit as a charge and in SRAM each bit is stored
using a flip-flop/latch
• DRAM requires higher power consumption under low levels of access,
(which is significant when used in battery-powered devices because it
requires more circuitry for refreshing) // SRAM uses less power (no
need to refresh)
• DRAM less expensive to purchase (requires fewer transistors) // SRAM
is more expensive to buy (as it requires more transistors)
• DRAM has slower access time/speed (because it needs to be
refreshed) // SRAM has faster access times
• DRAM can have higher storage/bit/data density // SRAM has lower
storage/bit/data density
• DRAM used in main memory and SRAM used in cache memory

4(d)(i) 1 mark for correct answer 1

Formal or legal recognition of ownership of the program // Formal or legal


restriction / permissions on use of the program // The intellectual property
rights to the program

4(d)(ii) 1 mark per bullet point 2

• She does not wish to release the source code


• She does not want anyone to be able to edit / modify / share the source
code/program
• She wants to make money from the program

© UCLES 2019 Page 8 of 11


MUHAMMAD ALI KHAN
PAGE 488
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

4(d)(iii) 1 mark for a name and a description of each licence to max 2 2

Commercial Software
• The program is purchased for a fee
• It restricts the number of users/possible time period for use // Limited
number of installations allowed // Software key needed to install
• Source code not provided // source code protected / cannot be edited
• Anyone can purchase/download if agree to the terms

Shareware
• The program is free for a trial period // The (free) program may have
limited functionality // Need to purchase / enter details after trial
• Users do not have access to the source code // source code may not be
edited
• Users may re-distribute the software.

Freeware
• There is no charge for the software
• The software could still be copyrighted
• She can set her own restrictions on what a user can do with the
program

Question Answer Marks

5(a)(i) 1 mark for correct answer 1

Repeated / duplicated data

5(a)(ii) 1 mark per bullet point 3

• Because each record/piece of data is stored once and is referenced by


a (primary) key
• Because data is stored in individual tables
• «and the tables are linked by relationships
• By the proper use of Primary and Foreign keys
• By enforcing referential integrity
• By going through the normalisation process

5(b)(i) 1 mark per bullet point 2

• Security ensures that data is safe from unauthorised access // safe from
loss
• Integrity ensures that data is accurate / consistent / up to date

© UCLES 2019 Page 9 of 11


MUHAMMAD ALI KHAN
PAGE 489
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

5(b)(ii) 1 mark for naming, 1 mark for description 4

For example:
• Access rights // User accounts
• Restrict actions (e.g. read / read-write) of specific users // unauthorised
users cannot access the database

• Views
• Restrict which parts of the database specific users can see

• Password // Biometrics // PIN code


• Prevents unauthorised access

• Automatic Backup
• Create regular copies of data in case of loss

• Encryption
• Data is incomprehensible to unauthorised users

5(b)(iii) 1 mark per bullet 2

• Query Processor
• Developer Interface

Question Answer Marks

6(a) 1 mark per gate The OR gates may be re-sequenced 5

Alternatively: 3-input OR gate


1 mark for first three gates, and 2 marks for 3-input OR gate

© UCLES 2019 Page 10 of 11


MUHAMMAD ALI KHAN
PAGE 490
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

6(b) 1 mark for each pair of rows (shaded) 4

A B C Working Space X

0 0 0 0

0 0 1 0

0 1 0 1

0 1 1 0

1 0 0 1

1 0 1 1

1 1 0 1

1 1 1 1

© UCLES 2019 Page 11 of 11


MUHAMMAD ALI KHAN
PAGE 491

Cambridge Assessment International Education


Cambridge International Advanced Subsidiary and Advanced Level
* 1 3 8 9 7 7 8 0 4 2 *

COMPUTER SCIENCE 9608/13


Paper 1 Theory Fundamentals May/June 2019
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 14 printed pages and 2 blank pages.

DC (SC) 163550/3
© UCLES 2019 [Turn over
MUHAMMAD ALI KHAN
PAGE 492

1 A computer has an operating system (OS) and utility software.

(a) The following table lists key management tasks performed by an operating system and
their descriptions.

Complete the table by writing the missing management task names and descriptions.

Management task Description

Memory management

Provides user accounts and passwords

Handles the signals sent when the attention of the processor is


required elsewhere

Provision of a software
platform

[4]

(b) A hard disk formatter and a hard disk defragmenter are two examples of utility software.

(i) Describe the actions performed by a hard disk formatter and a hard disk defragmenter.

Hard disk formatter ............................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Hard disk defragmenter .....................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

© UCLES 2019 9608/13/M/J/19


MUHAMMAD ALI KHAN
PAGE 493

(ii) Identify three other examples of utility software that can be installed on the computer.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2019 9608/13/M/J/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 494

2 Frankie is a software developer. He is developing a program to manage customer records for a


client with an online retail business. He must ensure that data stored about each customer are
both secure and private.

(a) State the difference between security and privacy.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Computer systems can be protected by physical methods such as locks.

Describe two non-physical methods used to improve the security of computer systems.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2019 9608/13/M/J/19


MUHAMMAD ALI KHAN
PAGE 495

(c) A computer uses parity blocks to check the data that has been received is the same as the
data that has been transmitted.

The following is an example of a parity block.

Parity
Data
bit
1 1 1 1 0 0 0 1
0 0 0 0 1 1 1 0
1 1 0 1 1 0 0 1
Parity
1 1 0 1 1 0 0 1
byte

(i) Describe how a parity block check can identify a bit that has been corrupted during
transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) Give a situation where a parity block check cannot identify corrupted bits.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2019 9608/13/M/J/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 496

(d) One principle of the ACM/IEEE Software Engineering Code of Ethics is to always act in the
best interest of the client.

Explain how Frankie can ensure that he is acting in the best interest of his client.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(e) When the program is complete, Frankie uses a compiler to prepare the program for the client.

Explain why Frankie uses a compiler instead of an interpreter.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 9608/13/M/J/19


MUHAMMAD ALI KHAN
PAGE 497

3 A company uses a relational database, EMPLOYEES, to store data about its employees and
departments.

(a) The company uses a Database Management System (DBMS).

(i) The DBMS has a data dictionary.

Describe what the data dictionary stores.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) The DBMS has a query processor.

Describe the purpose of a query processor.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(b) Relationships are created between tables using primary and foreign keys.

Describe the role of a primary and a foreign key in database relationships.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 9608/13/M/J/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 498

(c) In the company:

• An employee can be a manager.


• A department can have several managers and several employees.
• An employee can only belong to one department.

The EMPLOYEES database has three tables:

EMPLOYEE_DATA(EmployeeID, FirstName, LastName, DateOfBirth, Gender,


DepartmentNumber)
DEPARTMENT(DepartmentNumber, DepartmentName)
DEPARTMENT_MANAGER(DepartmentNumber, EmployeeID, role)

Complete the entity-relationship (E-R) diagram for the EMPLOYEES database.

EMPLOYEE_DATA

DEPARTMENT_MANAGER DEPARTMENT

[3]

(d) Give three reasons why the EMPLOYEES database is fully normalised.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2019 9608/13/M/J/19


MUHAMMAD ALI KHAN
PAGE 499

(e) Part of the EMPLOYEE_DATA table is shown.

EmployeeID FirstName LastName DateOfBirth Gender DepartmentNumber


156FJEK Harvey Kim 12/05/1984 Male S1
558RRKL Catriona Moore 03/03/1978 Female F2
388LMDV Oscar Ciao 01/01/1987 Male F2

(i) Write a Data Definition Language (DDL) statement to create the EMPLOYEES database.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Write a DDL statement to define the table EMPLOYEE_DATA, and declare EmployeeID
as the primary key.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

© UCLES 2019 9608/13/M/J/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 500

10

(iii) Write a Data Manipulation Language (DML) statement to return the first name and last
name of all female employees in the department named Finance.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

© UCLES 2019 9608/13/M/J/19


MUHAMMAD ALI KHAN
PAGE 501

11

4 A program is written in assembly language.

(a) The op codes LDM and LDD are used to load a register. The op code LDM uses immediate
addressing, and the op code LDD uses direct addressing.

Describe what happens when the following instructions are run.

LDM #300

...................................................................................................................................................

...................................................................................................................................................

LDD 300

...................................................................................................................................................

...................................................................................................................................................
[2]

(b) Assembly language instructions can be grouped by their purpose.

The following table shows four assembly language instructions.

Tick () one box in each row to indicate the group each instruction belongs to.

Jump Arithmetic Data


Instruction Description
instruction operation movement
LDR #3 Load the number 3 to the
Index Register
ADD #2 Add 2 to the Accumulator

JPN 22 Move to the instruction at


address 22
DEC ACC Subtract 1 from the
Accumulator
[3]

© UCLES 2019 9608/13/M/J/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 502

12

(c) The processor handles interrupts within the fetch-execute cycle.

(i) Give one example of a hardware interrupt and one example of a software interrupt.

Hardware ...........................................................................................................................

...........................................................................................................................................

Software ............................................................................................................................

...........................................................................................................................................
[2]

(ii) Explain how the processor handles an interrupt.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

© UCLES 2019 9608/13/M/J/19


MUHAMMAD ALI KHAN
PAGE 503

13

5 Xander creates a presentation that includes images, video and sound.

(a) The images are bitmap images. A bitmap image can be made up of any number of colours.
Each colour is represented by a unique binary number.

Draw one line from each box on the left, to the correct box on the right to identify the minimum
number of bits needed to store each maximum number of colours.

Maximum number of colours Minimum number of bits

1
68

2
256

127

2
8

249
9

[3]

© UCLES 2019 9608/13/M/J/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 504

14

(b) One of the videos has a frame rate of 40 fps (frames per second).

(i) State what is meant by 40 fps.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) One video uses interlaced encoding, and a second video uses progressive encoding.

Describe two differences between interlaced and progressive encoding.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

(c) The sound track has a sampling rate of 88.2 kHz and a sampling resolution of 32 bits.

State what is meant by a sampling rate of 88.2 kHz and a sampling resolution of 32 bits.

Sampling rate of 88.2 kHz .........................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Sampling resolution of 32 bits ..................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2019 9608/13/M/J/19


MUHAMMAD ALI KHAN
PAGE 505

Cambridge Assessment International Education


Cambridge International Advanced Subsidiary and Advanced Level

COMPUTER SCIENCE 9608/13


Paper 1 Written Paper May/June 2019
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.

This document consists of 10 printed pages.

© UCLES 2019 [Turn over


MUHAMMAD ALI KHAN
PAGE 506
9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2019 Page 2 of 10


MUHAMMAD ALI KHAN
PAGE 507
9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

1(a) 1 mark for each correct entry 4

Management task Description

Memory management Handles the allocation of memory to


processesௗ//ௗEnsures two programs do
not attempt to use the same memory
locationsௗ//ௗKeeps track of allocated and
free memory locations

Security management Provides user accounts and


passwords

Interrupt processing Handles the signals sent when the


attention of the processor is required
elsewhere

Provision of a Provides an environment within which


software platform programs can be run

1(b)(i) 1 mark per bullet point to max 2 for formatter, max 2 for defragmenter 4

hard disk formatter


Makes existing data inaccessible
Partitions the disk into logical drives
Sets up the (specified) file system
Prepares the disk for initial use
May check for errors on the disk

hard disk defragmenter


Re-organises the disk contents
Moves split files so they are contiguous
Creates a larger area of (contiguous) free space

1(b)(ii) 1 mark per bullet point 3

For example:

Backup software
File compression
Virus checker
Disk contents analysisௗ/ௗrepair

© UCLES 2019 Page 3 of 10


MUHAMMAD ALI KHAN
PAGE 508
9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

2(a) 1 mark per bullet point 2

Security: keep data safe from accidental/malicious damage/loss


Privacy: keep data confidentialௗ//ௗonly seen by authorised personnel

2(b) 1 mark for identifying method 2 marks for description to max 2 × 3 6

For example:
User accounts
User has a username and password Access to resources can be limited
to specific accounts
Cannot access system without valid username and passwordௗ//ௗprevents
unauthorised access to the system

Firewall
All incoming and outgoing network traffic goes through firewall
Blocks signals that do not meet requirements
Keeps a log of signals
Applications can have network access restricted

Anti-malware
Scans for malicious software
Quarantines or deletes any malicious software found
Scans can be scheduled at regular intervals
Should be kept up to date

Auditing
Logging all actions/changes to the system
In order to identify any unauthorised use

Application Security (accept equivalent)


Applying regular updatesௗ/ௗpatches
Finding, fixing and preventing security vulnerabilities in any (installed)
application

2(c)(i) 1 mark per bullet to max 4 4

Each byte has a parity bitௗ//ௗhorizontal parity


An additional parity byte is sent with vertical (and horizontal) parity
Each row and column must have an even/odd number of 1s
Identify the incorrect row and column
The intersection is the error

2(c)(ii) 1 mark for correct answer 1

Errors in an even number of bits (could cancel each other out)

© UCLES 2019 Page 4 of 10


MUHAMMAD ALI KHAN
PAGE 509
9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

2(d) 1 mark per bullet point to max 3 3

For example: He should ...


...Keep the client’s personal data private
...Involve the client in the developmentௗ//ௗ«Communicate with the client
«Provide the solution that the client asked for
...Keep the project running on timeௗ//ௗbudget
...Keep the client informed of any problems/delays

2(e) 1 mark per bullet point to max 3 3

He uses a compiler because it creates a separate executable file


The executable means the client cannot access the source codeௗ//ௗedit
the program
The executable means the client does not need the IDEௗ/ௗcompiler
It will (probably) be faster to run the executable than to interpret the
source code every time the program is run

Question Answer Marks

3(a)(i) 1 mark per bullet point 2

Stores all the information about the databaseௗ//ௗdata about the


dataௗ//ௗmetadata about the data
For example, fields, data types, validation, keys

3(a)(ii) 1 mark per bullet point to max 2 2

Allows the user to enter criteria


Searches for data which meets the entered criteria
Organises the results to be displayed to the user

3(b) 1 mark per bullet point to max 2 2

Primary key uniquely identifies each tupleௗ//ௗEach tuple in the table is


unique
Primary key can be used as a foreign key in another table
«.. to form a link/relationship between the tables

By example:
Identification of a primary key in a table
Describing that primary key in another table as a foreign key

© UCLES 2019 Page 5 of 10


MUHAMMAD ALI KHAN
PAGE 510
9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

3(c) 1 mark for each correct link 3

3(d) 1 mark per bullet point to max 3 3

There are no repeating groups (1NF)


There are no partial dependencies (2NF)
There are no non-key dependenciesௗ//ௗThere are no transitive
dependencies (3NF)

3(e)(i) 1 mark for correct answer 1

CREATE DATABASE EMPLOYEES;

3(e)(ii) 1 mark per bullet 5

Create table EMPLOYEE_DATA with open and close brackets


EmployeeID as VarChar restricted to max 7, Gender as a
VarChar restricted to max 6, DepartmentNumber as a VarChar
restricted to max 2
FirstName and LastName as VarChar (any max lengths must
be reasonable)
Date of birth as Date
Declaring EmployeeID as PK

CREATE TABLE EMPLOYEE_DATA (


EmployeeID VarChar(7),
FirstName VarChar,
LastName VarChar,
DateOfBirth Date,
Gender VarChar(6),
DepartmentNumber VarChar(2),
PRIMARY KEY (EmployeeID)
);

© UCLES 2019 Page 6 of 10


MUHAMMAD ALI KHAN
PAGE 511
9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

3(e)(iii) 1 mark per bullet 5

Select FirstName and LastName only


From both tables
Where DepartmentName = “Finance”
AND Gender = “Female”
Joining tables (either AND, or inner join)

SELECT FirstName, LastName


FROM EMPLOYEE_DATA, DEPARTMENT
WHERE DepartmentName = "Finance"
AND Gender = "Female"
AND DEPARTMENT.DepartmentNumber =
EMPLOYEE_DATA.DepartmentNumber;

Question Answer Marks

4(a) 1 mark per bullet 2

LDM #300 The (denary) number 300 is loaded (into the register)
LDD 300 The contents of address 300 are loaded (into the
register)

4(b) 1 mark for JPN correct 3


1 mark for both of ADD and DEC correct
1 mark for LDR correct

Description Jump Arithmetic Data


instruction operation movement

LDR #3 Load the number 3 9


to the Index Register

ADD #2 Add 2 to the 9


Accumulator

JPN 22 Move to the 9


instruction at
address 22

DEC ACC Subtract 1 from the 9


Accumulator

© UCLES 2019 Page 7 of 10


MUHAMMAD ALI KHAN
PAGE 512
9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

4(c)(i) 1 mark for hardware interrupt 1 mark for software interrupt 2

For example:

Hardware interrupt
Printer out of paper
No CD in drive

Software interrupt
A running program needs input
Runtime error, e.g. division by zero

4(c)(ii) 1 mark per bullet to max 5 5

At the startௗ/ௗend of each fetch-execute cycle the processor checks


for interrupt(s)
Check if an interrupt flag is setௗ//ௗCheck if bit set in interrupt register
Processor identifies source of interrupt
Processor checks priority of interrupt
If interrupt priority is high enoughௗ//ௗLower priority interrupts are
disabled
Processor saves current contents of registersௗ//ௗsaves current job
on stack
Processor calls interrupt handlerௗ/ௗInterrupt Service Routine (ISR)
Address of ISR is loaded into Program Counter (PC)
When servicing of interrupt complete, processor restores
registersௗ//ௗjob from stack is restored
Lower priority interrupts are re-enabled
Processor continues with next F–E cycle

© UCLES 2019 Page 8 of 10


MUHAMMAD ALI KHAN
PAGE 513
9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

5(a) 1 mark for each correctly linked box on the right 3


Maximum number Minimum number
of colurs of bits

68

256

127

249

5(b)(i) 1 mark for correct answer 1

40 images or frames are displayed/recorded each second

5(b)(ii) 1 mark per bullet to max 4 4

Progressive – each frame contains (all the lines for) the complete
image
Interlaced – each frame contains half the (number of lines) of the
complete image

Progressive – frames are not divided into fields


Interlaced – each frame divided into two fieldsௗ//ௗOne field contains
the data for the even numbered rowsௗ/ௗlines and the other has the
data for the odd numbered rowsௗ/ௗlines.

Progressive – complete frames are displayed in sequence


Interlaced – data from two frames is displayed simultaneously

Progressive – the number of images stored is the same as the


frame rateௗ//ௗthe rate of picture display is the same as the frame
rate.
Interlaced – the rate of picture display (the field rate) is twice the
rate of image frame display (the frame rate).

Progressive means the entire frame is refreshed each time


Interlaced means only half the frame is refreshed

Progressive has high bandwidth requirements


Interlaced halves the transmission bandwidth requirements.

© UCLES 2019 Page 9 of 10


MUHAMMAD ALI KHAN
PAGE 514
9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

5(c) 1 mark per bullet 2

88.2ௗkHz
The sound wave is sampled 88200 times per second

32 bits
Each sample is stored as a 32-bit binary number

© UCLES 2019 Page 10 of 10


MUHAMMAD ALI KHAN
PAGE 515

Cambridge Assessment International Education


Cambridge International Advanced Subsidiary and Advanced Level
* 4 6 2 6 0 5 7 6 4 3 *

COMPUTER SCIENCE 9608/11


Paper 1 Theory Fundamentals October/November 2019
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 14 printed pages and 2 blank pages.

DC (LEG/CB) 171630/4
© UCLES 2019 [Turn over
MUHAMMAD ALI KHAN
PAGE 516

1 Von Neumann is an example of a computer architecture.

(a) The diagram has registers used in Von Neumann architecture on the left and descriptions on
the right.

Draw one line to match each register with its correct description.

Register Description

Stores the data that has just been read from


memory, or is about to be written to memory
Current Instruction Register

Stores the instruction that is being decoded


and executed

Memory Address Register

Stores the address of the input device from


which the processor accesses the instruction

Program Counter
Stores the address of the next instruction to
be read

Memory Data Register


Stores the address of the memory location
about to be written to or read from

[4]

© UCLES 2019 9608/11/O/N/19


MUHAMMAD ALI KHAN
PAGE 517

(b) Many components of the computer system transfer data between them using buses. One
example of a bus is an address bus.

(i) Name two other buses that exist within a computer and give the purpose of each.

Bus 1 .................................................................................................................................

Purpose .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Bus 2 .................................................................................................................................

Purpose .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

(ii) State the benefit of increasing the address bus width from 16 bits to 32 bits.

...........................................................................................................................................

..................................................................................................................................... [1]

(c) The following statements describe features of a low-level language.

Complete the statements by writing the appropriate terms in the spaces.

A ........................................................... is a sequence of instructions that are given an

identifier. These instructions may need to be executed several times.

A ........................................................... is an instruction that tells the assembler to do

something. It is not a program instruction.

7KH SURFHVVRU·V LQVWUXFWLRQ VHW FDQ EH SXW LQWR VHYHUDO JURXSV 2QH RI WKHVH JURXSV LV

........................................................... .
[3]

© UCLES 2019 9608/11/O/N/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 518

2 Aaron uses a desktop computer to do school work.

(a) Aaron has a mouse and keyboard that he can use as input devices and a monitor as an
output device.

(i) Identify two additional input devices Aaron could use with his desktop computer.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(ii) Identify two additional output devices Aaron could use with his desktop computer.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(iii) Aaron needs to store a large number of applications and data on his computer. He needs
at least 50GB of secondary storage space.

Identify oneLQWHUQDOVHFRQGDU\VWRUDJHGHYLFHIRU$DURQ·VFRPSXWHU

...........................................................................................................................................

..................................................................................................................................... [1]

(iv) Describe the internal operation of a trackerball mouse.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

© UCLES 2019 9608/11/O/N/19


MUHAMMAD ALI KHAN
PAGE 519

(b) $DURQ·VFRPSXWHUKDVDQRSHUDWLQJV\VWHP 26 7KH26PDQDJHVWKHUXQQLQJSURFHVVHV


and provides a user interface.

Describe these OS management tasks.

Process management ...............................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Provision of a user interface .....................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

(c) $DURQ·VFRPSXWHUKDVDYLUXVFKHFNHUDQGEDFNXSVRIWZDUH

Describe these utility programs.

Virus checker ............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Backup software .......................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2019 9608/11/O/N/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 520

(d) Aaron creates a web page using JavaScript code and HTML tags.

Describe how the JavaScript code is translated using an interpreter.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 9608/11/O/N/19


MUHAMMAD ALI KHAN
PAGE 521

3 (a) A bank approves a customer for an account based on the criteria in the following table.

Parameter Description of parameter Binary value Condition

1 True
A Employed
0 False
1 True
B Self-employed
0 False
1 True
C Over 21
0 False
1 True
D Earn more than 30 000
0 False
1 True
E Another account
0 False

A customer is approved (X = 1) if the person:

• is over 21 and employed


or
• is over 21 and self-employed and

• either earns more than 30 000


or
• has another account.

Draw a logic circuit to represent the model.

C X

[5]

© UCLES 2019 9608/11/O/N/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 522

(b) Complete the truth table for the logic expression:

X = (A AND C) OR (NOT A AND (B XOR C))

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2019 9608/11/O/N/19


MUHAMMAD ALI KHAN
PAGE 523

4 &XVWRPHUVRIDEDQNFDQDFFHVVWKHLUDFFRXQWLQIRUPDWLRQE\ORJJLQJLQRQWKHEDQN·VZHEVLWH

(a) The bank has a client-server model of networked computers.

(i) Describe, using the bank as an example, the key features of a client-server model.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) Give two other examples of applications that can use the client-server model.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(b) 7KHEDQN·VFXVWRPHUVORJLQWRWKHZHEVLWHXVLQJDZHEDSSOLFDWLRQ

Explain why the web application uses server-side scripting.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 9608/11/O/N/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 524

10

(c) The bank is upgrading its local area network (LAN) copper cables to fibre-optic cables.

(i) State two benefits to the bank of upgrading to fibre-optic cable from copper cable.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(ii) State two drawbacks of upgrading to fibre-optic cables.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2019 9608/11/O/N/19


MUHAMMAD ALI KHAN
PAGE 525

11

(d) The bank uses a relational database, ACCOUNTS, to store the information about customers
and their accounts.

7KHGDWDEDVHVWRUHVWKHFXVWRPHU·VILUVWQDPHODVWQDPHDQGGDWHRIELUWK

The bank has several different types of account. Each account type has a unique ID number,
name (for example, regular or saving) and bonus (for example, $5.00, $10.00 or $15.00).

A customer can have more than one account.

(DFK FXVWRPHU·V DFFRXQW KDV LWV RZQ ,' QXPEHU DQG VWRUHV WKH DPRXQW RI PRQH\ WKH
customer has in that account.

The bank creates a normalised, relational database to store the required information. There
are three tables:

• CUSTOMER
• ACCOUNT_TYPE
• CUSTOMER_ACCOUNT

(i) Write the attributes for each table to complete the database design for the bank.

CUSTOMER( .......................................................................................................................

...........................................................................................................................................

.........................................................................................................................................)

ACCOUNT_TYPE( ..............................................................................................................

...........................................................................................................................................

.........................................................................................................................................)

CUSTOMER_ACCOUNT( ......................................................................................................

...........................................................................................................................................

.........................................................................................................................................)
[3]

(ii) Identify the primary key for each table that you designed in part (d)(i).

CUSTOMER .........................................................................................................................

ACCOUNT_TYPE ................................................................................................................

CUSTOMER_ACCOUNT ........................................................................................................
[2]

(iii) Identify one foreign key in one of the tables that you designed in part (d)(i).

Table name ........................................................................................................................

Foreign key .......................................................................................................................


[1]
© UCLES 2019 9608/11/O/N/19 [Turn over
MUHAMMAD ALI KHAN
PAGE 526

12

(iv) The following table has definitions of database terms.

Write the correct database term in the table for each definition.

Definition Term

All the data about one entity

The data in one row of a table

A column or field in a table


[3]

© UCLES 2019 9608/11/O/N/19


MUHAMMAD ALI KHAN
PAGE 527

13

5 (a) The bit depth of an image dictates how many different colours can be represented by each
pixel.

(i) State the number of different colours that can be represented by a bit depth of 8 bits.

..................................................................................................................................... [1]

(ii) One binary colour is represented by 0100 1110

Convert the unsigned binary number 0100 1110 into denary.

..................................................................................................................................... [1]

(b) &RQYHUWWKHGHQDU\QXPEHUïLQWRELWWZR·VFRPSOHPHQW

............................................................................................................................................. [1]

(c) (i) Convert the Binary Coded Decimal (BCD) value 0110 1001 into denary.

..................................................................................................................................... [1]

(ii) Identify one practical application where BCD is used.

...........................................................................................................................................

..................................................................................................................................... [1]

(d) One example of a character set used by computers is ASCII.

Describe how one character is represented in a character set.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 9608/11/O/N/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 528

14

(e) Data can be compressed using either lossy or lossless compression.

Tick () one box in each scenario to identify whether lossy or lossless compression should
be used. Justify your choice.

(i) A program written in a high-level language.

Lossy Lossless

Justification .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) A photograph that needs to be emailed to a friend.

Lossy Lossless

Justification .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) You need to upload a video that you have created to a website.

Lossy Lossless

Justification .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2019 9608/11/O/N/19


MUHAMMAD ALI KHAN
PAGE 529

Cambridge Assessment International Education


Cambridge International Advanced Subsidiary and Advanced Level

COMPUTER SCIENCE 9608/11


Paper 1 Written Paper October/November 2019
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 8 printed pages.

© UCLES 2019 [Turn over


MUHAMMAD ALI KHAN
PAGE 530
9608/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

 the specific content of the mark scheme or the generic level descriptors for the question
 the specific skills defined in the mark scheme or in the generic level descriptors for the question
 the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

 marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
 marks are awarded when candidates clearly demonstrate what they know and can do
 marks are not deducted for errors
 marks are not deducted for omissions
 answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2019 Page 2 of 8


MUHAMMAD ALI KHAN
PAGE 531
9608/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

1(a) 1 mark for each correct line 4

Register Description

Stores the data that has just been


Current Instruction read from memory, or is about to be
Register written to memory

Stores the instruction that is being


Memory Address decoded and executed
Register

Stores the address of the input


device from which the processor
Program Counter accesses the instruction

Stores the address of the next


instruction to be read
Memory Data
Register Stores the address of the memory
location about to be written to or
read from

1(b)(i) 1 mark for naming, 1 mark for purpose for each bus 4
 Data bus
 Carries data between the processor and memory / carries data that is
currently being processed.

 Control bus
 Transmits signals between the control unit and the other components

1(b)(ii) Significant increase in the number of directly addressed memory locations // 1


increases the number of directly addressable memory locations from 216 to232

1(c) 1 mark for each correctly inserted term 3

A macro is a sequence of instructions that are given an identifier. These


instructions may need to be executed several times.

A directive is an instruction that tells the assembler to do something. It is not


a program instruction.

The processor’s instruction set can be put into several groups. One of these
groups is data movement // input and output // arithmetic operations //
jump instructions // compare instructions // modes of addressing.

© UCLES 2019 Page 3 of 8


MUHAMMAD ALI KHAN
PAGE 532
9608/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

2(a)(i) 1 mark per device to max 2 2

e.g.
 Trackpad/touchpad
 microphone
 touchscreen
 scanner

2(a)(ii) 1 mark per device to max 2 2

e.g.
 printer
 speakers
 touchscreen

2(a)(iii) Magnetic hard disk drive // solid state drive 1

2(a)(iv) 1 mark per bullet point to max 3 3

 The ball touches horizontal and vertical rollers


 When the ball rotates / moves
 « one or both of the rollers rotate as well
 Each roller connects to a shaft which spins a disk with holes
 Infrared beams shine through the holes in the disks
 As the ball moves the roller the beam is broken by the space between
the holes
 ... creating pulses of light
 The distance and/or speed of the mouse is determined from the rate of
the pulses
 « by an on-board processor chip // by driver software in the computer

2(b) 1 mark per bullet point to max 4 for each management task, max 6 in total 6

Process management:
 Manages the scheduling of processes
 « allows multi-tasking / multi-processing
 « ensures fair access
 « handles priorities
 Manages the resources the processes need
 Enables processes to share information
 Prevents interference between processes// resolution of conflicts

Provision of a user interface:


 Allows a user to communicate with the hardware // vice-versa
 « by making navigation around the system easier
 Provides facility for user inputting data
 Provides facility for outputting to the user
 By example e.g. command line / GUI / menu-driven

© UCLES 2019 Page 4 of 8


MUHAMMAD ALI KHAN
PAGE 533
9608/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

2(c) 1 mark per bullet point to max 3 for each utility program, max 4 in total 4

Virus checker:
 Scans files stored on a computer system for malicious code
 Scans files when they enter the system / memory stick inserted /
download etc.
 Sets up a schedule for virus-checking
 Isolates / quarantines / deletes viruses
 Regularly updates the virus definitions

Backup software:
 Creates a copy of the contents of a disk / partition. Can be set up to
automatically backup // schedules backups
 Allows the user to decide what is backed up, e.g. all data // all files that
have changed since the last backup
 Allows the user to set up an off-site backup
 May encrypt the backup files
 Restores the data if necessary

2(d) 1 mark per bullet point to max 2 2

 The code is translated one line at a time


 ... and executed immediately
 The interpreter stops as soon as it finds an error

Question Answer Marks

3(a) 1 mark for each gate 5

 A AND C
 B AND C
 D OR E
 (B AND C) AND (D OR E)
 Final OR

© UCLES 2019 Page 5 of 8


MUHAMMAD ALI KHAN
PAGE 534
9608/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

3(b) 1 mark for each pair of correct rows 4

A B C Working space X

0 0 0 0

0 0 1 1

0 1 0 1

0 1 1 0

1 0 0 0

1 0 1 1

1 1 0 0

1 1 1 1

Question Answer Marks

4(a)(i) 1 mark per bullet point to max 3. If no application to the bank max 2 3

 The bank's server holds the customer account data / website


 ... and performs the requested tasks / processes. The computers used
by the customers are the clients «
 « that send requests to the server
 « which returns the results of the request
 « E.g. a customer asks for a list of recent transactions on their account.

4(a)(ii) 1 mark per example to max 2 2

e.g.
 Sending and receiving email
 A company or school centrally storing files
 Using a print server
 Using a file server

4(b) 1 mark per bullet point to max 3 3

 All data is held on the server // All processing is performed on the server
 The server only sends the results of the query to the client
 The client does not have access to all the data
 ... which keeps the data more secure / consistent
 Customers can be identified when they log in
 «from a database of usernames and passwords

© UCLES 2019 Page 6 of 8


MUHAMMAD ALI KHAN
PAGE 535
9608/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

4(c)(i) 1 mark per bullet point to max 2 2

 Less interference in the signal


 The signal does not degrade as quickly // Needs less signal boosting
 More secure // more difficult to hack
 Greater bandwidth // Faster transmission speeds possible

4(c)(ii) 1 mark per bullet point to max 2 2

 Initial installation cost is higher // Cable / hardware is more expensive to


buy per metre
 Specialists / trained personnel are needed to install / maintain
 Difficult to terminate // The electronics at both ends are more complex
 Fibres can break when bent
 Only transmits data in one direction // Cannot transmit power, only data

4(d)(i) 1 mark per table 3

 Table CUSTOMER with fields FirstName, LastName, DateOfBirth,


CustomerID
 Table ACCOUNT_TYPE with fields AccountID, Name, Bonus
 Table CUSTOMER_ACCOUNT with fields ID, CustomerID, AccountID,
Amount

CUSTOMER (CustomerID, FirstName, LastName, DateOfBirth)

ACCOUNT_TYPE (AccountID, Name, Bonus)

CUSTOMER_ACCOUNT (ID, CustomerID, AccountID, Amount)

4(d)(ii) 1 mark for 1 or 2 correct Primary Keys, 2 marks for 3 correct Primary Keys 2

CUSTOMER: CustomerID
ACCOUNT_TYPE: AccountID
CUSTOMER_ACCOUNT: ID

4(d)(iii) 1 mark for both table name and Foreign Key 1

Table: CUSTOMER_ACCOUNT
Foreign Key: CustomerID / AccountID

4(d)(iv) 1 mark for each correct term 3

Definition Term

All the data about one entity Table / Relation

The data in one row of a table Tuple / Record

A column or field in a table Attribute

© UCLES 2019 Page 7 of 8


MUHAMMAD ALI KHAN
PAGE 536
9608/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

5(a)(i) 256 1

5(a)(ii) 78 1

5(b) 1111 0011 1110 1

5(c)(i) 69 1

5(c)(ii) Any scenario where a single digit needs to be transmitted / displayed 1

e.g. calculator / digital clock

5(d) 1 mark per bullet to max 2 2

 Each character is represented by a unique


 « denary / hexadecimal / binary number

5(e)(i) 1 mark per bullet to max 2 2

Lossless:
 All the data is needed // the original file is fully restored
 If any data is lost, the program will not run
 Probably does not require significant reduction in file size // a program
written in a high-level language is just text, so does not need much
reduction in size

5(e)(ii) 1 mark per bullet to max 2 2


Lossy:
 All the data is not required
 The number of colours / resolution can be reduced without the user
noticing
 Email requires a significantly smaller file size // takes less time to
transmit
Lossless:
 A high quality image may be needed
 All of the data is needed // cannot afford to lose any data // the original
file is fully restored

5(e)(iii) 1 mark per bullet to max 2 2


Lossy:
 Some loss of quality will not be noticed // high quality video not needed
on the website
 A more significant reduction may be needed
 Takes a shorter time to upload / download // requires less bandwidth
Lossless:
 A high quality video may be needed
 Might only be a short video clip
 All of the data is needed // cannot afford to lose any data // the original
file is fully restored

© UCLES 2019 Page 8 of 8


MUHAMMAD ALI KHAN
PAGE 537

Cambridge Assessment International Education


Cambridge International Advanced Subsidiary and Advanced Level
* 5 3 3 9 7 0 9 6 4 6 *

COMPUTER SCIENCE 9608/12


Paper 1 Theory Fundamentals October/November 2019
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 14 printed pages and 2 blank pages.

DC (SC/CB) 171631/1
© UCLES 2019 [Turn over
MUHAMMAD ALI KHAN
PAGE 538

1 (a) The diagram shows different types of software on the left, and descriptions on the right.

Draw a line from each type of software to its correct description.

Type of software Description

Provides a ready-built routine that can be


imported into a program

Operating system

Provides an interface between the user and


the hardware

Utility program

Converts source code into a low-level


language

Library program

Creates a new document for the user to edit

Compiler

An additional program that helps to maintain


or configure the system

[4]

(b) Describe the purpose of disk repair software.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 9608/12/O/N/19


MUHAMMAD ALI KHAN
PAGE 539

2 (a) Draw a logic circuit to represent the following logic expression:

X = NOT (A AND B) AND (C XOR D)

B
X

[4]

(b) Complete the truth table for the logic expression:

X = NOT (A AND B) OR (A AND (B XOR C))

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2019 9608/12/O/N/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 540

4 Anushka needs to store information about bookings at a sports club.

(a) Anushka has a file-based storage system. She wants a relational database.

(i) 'HVFULEHWKHIHDWXUHVRIDUHODWLRQDOGDWDEDVHWKDWDGGUHVVWKHOLPLWDWLRQVRI$QXVKND·V
file-based system.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) The relational database design needs to be normalised. The following statements
describe the three stages of database normalisation.

Complete the statements by filling in the missing words.

For a database to be in First Normal Form (1NF) there must be no ..................................

groups of attributes.

For a database to be in Second Normal Form (2NF), it must be in 1NF, and contain no

.................................. key dependencies.

For a database to be in Third Normal Form (3NF), it must be in 2NF, and all attributes

must be fully dependent on the .................................. .................................. .


[4]

© UCLES 2019 9608/12/O/N/19


MUHAMMAD ALI KHAN
PAGE 541

(b) The normalised relational database, SPORTS_CLUB, has the following table design.

MEMBER(MemberID, FirstName, LastName, MembershipType)

SESSION(SessionID, Description, SessionDate, SessionTime, NumberMembers)

TRAINER(TrainerID, TrainerFirstName, TrainerLastName)

MEMBER_SESSION(MemberID, SessionID)

SESSION_TRAINER(SessionID, TrainerID)

(i) Anushka has designed an entity-relationship (E-R) diagram for SPORTS_CLUB.

Complete the entity-relationship (E-R) diagram.

MEMBER SESSION

MEMBER_SESSION SESSION_TRAINER

TRAINER

[2]

(ii) Anushka first needs to create the database that she has designed.

Write a Data Definition Language (DDL) statement to create the SPORTS_CLUB


database.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2019 9608/12/O/N/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 542

(iii) The table shows some sample data for the table SESSION.

SessionID Description SessionDate SessionTime NumberMembers


21PL Pilates junior 04/04/2020 18:00 15
13AE Aerobics senior 04/04/2020 19:00 20
Weightlifting
33WG 04/04/2020 10:00 10
advanced

Write a DDL script to create the table SESSION.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

(iv) Write a Data Manipulation Language (DML) script to return the first name and last name
of all members who have Peak membership type.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

© UCLES 2019 9608/12/O/N/19


MUHAMMAD ALI KHAN
PAGE 543

5 Mica has created some software and has copyrighted it. She wants to stop other people from
copying and changing it illegally.

(a) Identify two ways Mica can prevent illegal copies of the software being installed.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Identify one way Mica can distribute the software without the source code.

...................................................................................................................................................

............................................................................................................................................. [1]

(c) Mica is releasing the software under a commercial licence.

(i) Give two benefits to Mica of using a commercial licence.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(ii) Name two other types of software licence.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2019 9608/12/O/N/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 544

10

6 Dominic uses a tablet computer to complete work. He records videos of his work to send to his
colleagues to watch at a later date.

(a) The tablet computer has input and output devices.

(i) The table lists four devices built into the tablet.

Tick () one or more boxes for each device to identify whether it is an input device, an
output device or both.

Device Input Output

Touchscreen

Webcam

Microphone

Fingerprint scanner
[2]

© UCLES 2019 9608/12/O/N/19


MUHAMMAD ALI KHAN
PAGE 545

11

(ii) An external speaker is plugged into the tablet computer.

The sequence of steps 1 to 7 describes the internal operation of the speaker.

The statements A, B, C, D and E are used to complete the sequence.

Letter Statement

Changes in the audio signal cause the direction of the electrical current to change.
A
This determines the polarity of the electromagnet.

B The vibration creates sound waves.

C An electric current is sent to the speaker.

D The electromagnet is repelled by, or attracted to the permanent magnet.

E The electric current passes through the coil.

Write one of the letters A to E in each appropriate row to complete the sequence.

1 ............................

2 ............................

3 The current in the coil creates an electromagnetic field.

4 ............................

5 ............................

6 The movement of the coil causes the diaphragm to vibrate.

7 ............................
[4]

© UCLES 2019 9608/12/O/N/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 546

12

(b) 7KHWDEOHWFRPSXWHU·VVHFRQGDU\VWRUDJHLVVROLGVWDWH IODVK PHPRU\

(i) Give one reason why the tablet computer needs secondary storage.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Describe solid state memory.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(c) The tablet computer has RAM and ROM memory.

State the purpose of RAM and ROM memory in the computer.

RAM ..........................................................................................................................................

...................................................................................................................................................

ROM .........................................................................................................................................

...................................................................................................................................................
[2]

(d) 'RPLQLF·VWDEOHWFDSWXUHVDYLGHRRI'RPLQLFWRVHQGWRRWKHUSHRSOH7KHYLGHRLVPDGHRID
sequence of images and a sound file.

(i) Describe how the images and sound are encoded into a digital form.

Images ..............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Sound ................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]
© UCLES 2019 9608/12/O/N/19
MUHAMMAD ALI KHAN
PAGE 547

13

(ii) The sequence of images and the sound file create a video. This is sent over the Internet
as a video stream. The video stream can use interlaced encoding or progressive
encoding.

Describe the terms interlaced encoding and progressive encoding.

Interlaced encoding ...........................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Progressive encoding ........................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

(e) Dominic sends his videos to his colleagues over the Internet using bit streaming.

(i) Describe how the video is sent using bit streaming.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) Circle either Real-time or on-demand to identify whether the video will be sent using
real-time or on-demand bit streaming. Justify your choice.

Real-time / on-demand

Justification .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[2]
© UCLES 2019 9608/12/O/N/19 [Turn over
MUHAMMAD ALI KHAN
PAGE 548

14

(iii) Describe the following video terms.

Temporal redundancy ........................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Spatial redundancy ...........................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2019 9608/12/O/N/19


MUHAMMAD ALI KHAN
PAGE 549

Cambridge Assessment International Education


Cambridge International Advanced Subsidiary and Advanced Level

COMPUTER SCIENCE 9608/12


Paper 1 Written Paper October/November 2019
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 10 printed pages.

© UCLES 2019 [Turn over


MUHAMMAD ALI KHAN
PAGE 550
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

 the specific content of the mark scheme or the generic level descriptors for the question
 the specific skills defined in the mark scheme or in the generic level descriptors for the question
 the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

 marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
 marks are awarded when candidates clearly demonstrate what they know and can do
 marks are not deducted for errors
 marks are not deducted for omissions
 answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2019 Page 2 of 10


MUHAMMAD ALI KHAN
PAGE 551
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

1(a) 1 mark per correct line 4

Type of software Description

Provides a ready-built routine that


can be imported into a program
Operating
system

Provides an interface between


Utility the user and the hardware
program
Converts source code into a
low-level language
Library
program
Creates a new document for
the user to edit
Compiler

An additional program that helps


to maintain or configure the
system

1(b) 1 mark per bullet point to max 3 3

Disk repair:
 Checks for any errors / inconsistencies / bad sectors on the disk
 Resolves any errors on the disk
 Retrieves files / data from a damaged disk // re-constructs directory //
recovers disc when data corrupt
 Marks bad sectors on the disk // marks bad sectors as unusable

© UCLES 2019 Page 3 of 10


MUHAMMAD ALI KHAN
PAGE 552
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

2(a) 1 mark per gate 4

2(b) 1 mark for each pair of answers 4

A B C Working space X

0 0 0 1

0 0 1 1

0 1 0 1

0 1 1 1

1 0 0 1

1 0 1 1

1 1 0 1

1 1 1 0

Question Answer Marks

3(a) 1 mark per bullet point 2

 multiply
 addition
 value1

3(b) 100 1

3(c) To increment the value in value1 (by one) 1

© UCLES 2019 Page 4 of 10


MUHAMMAD ALI KHAN
PAGE 553
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

3(d) 1 mark per bullet point to max 2 2

 value1 will still be a string // No conversion to integer


 it will concatenate the digits together rather than add
 by specific example e.g. if 3 is input, 33 will be output rather than 6

Question Answer Marks

4(a)(i) 1 mark per bullet point, max 3 marks from any group to max 4 4

 Multiple tables are linked together


 « which eliminates / reduces data redundancy / duplication
 « and increases data integrity / consistency
 « which reduces compatibility issues
 « so data need only be updated once
 « and associated data will be automatically updated // referential integrity
can be enforced
 « which eliminates unproductive maintenance // which makes it easier to
maintain the data

 Program-data independence means that


 « the structure of data can change and does not affect program
 « the structure of programs can change and does not affect data
 « the data can be accessed by any appropriate program

 Allows concurrent access to data


 « by the use of record locking
 « by restricting over-writing changes

 Complex queries can be more easily written


 ... to search / find specific data // specific example related to the sports club

 Different users can be given different access rights


 « which improves security

 Different users can be given different views of the data


 ... so they do not see confidential information
 « and data privacy is maintained
 « accept a valid example related to the sports club

4(a)(ii) 1 mark for each word in the correct position 4

For a database to be in First Normal Form (1NF) there must be no repeating


groups of attributes.

For a database to be in Second Normal Form (2NF), it must be in 1NF, and


contain no partial key dependencies.

For a database to be in Third Normal Form (3NF), it must be in 2NF, and all
attributes must be fully dependent on the primary key.

© UCLES 2019 Page 5 of 10


MUHAMMAD ALI KHAN
PAGE 554
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

4(b)(i) 1 mark for SESSION to MEMBER_SESSION (one-to-many) 2


1 mark for TRAINER to SESSION_TRAINER (one-to-many)

4(b)(ii) CREATE DATABASE SPORTS_CLUB; 1

4(b)(iii) 1 mark per bullet point 5

 CREATE TABLE SESSION and ( );


 SessionID as char(4) / varchar / varchar(4) / text
and Description as varchar / varchar(x) / char(x) /
text
 SessionDate as date and SessionTime as time
 NumberMembers as integer / integer(2) / int / int(2)
 SessionID set as a Primary Key

Example 1:
CREATE TABLE SESSION(
SessionID Char(4),
Description Varchar,
SessionDate Date,
SessionTime Time,
NumberMembers Integer,
PRIMARY KEY (SessionID)
);

Example 2:
CREATE TABLE SESSION(
SessionID Char(4)NOT NULL PRIMARY KEY,
Description Varchar,
SessionDate Date,
SessionTime Time,
NumberMembers Integer);

© UCLES 2019 Page 6 of 10


MUHAMMAD ALI KHAN
PAGE 555
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

4(b)(iv) 1 mark per bullet point 3

 Select FirstName and comma and LastName


 From MEMBER
 Where MembershipType = "Peak"

SELECT FirstName, LastName


FROM MEMBER
WHERE MembershipType = "Peak";

Question Answer Marks

5(a) 1 mark per bullet point to max 2 2

 Encryption
 Assign a unique code so it will not install without this // product key
 Limit the number of times that version of the software can be installed
 Set a time limit within which the software must be installed

5(b)  Provide an .exe file // Compile the source code // Use a compiler 1

5(c)(i) 1 mark per benefit to max 2 2

 So that she can sell the software for a fee // make money from the software
 A commercial licence prohibits unauthorised/further copies being made
and/or distributed
 A commercial licence prohibits any changes to the software

5(c)(ii) 1 mark per bullet point to max 2 2

 Open Source
 Free Software
 Shareware
 Freeware

© UCLES 2019 Page 7 of 10


MUHAMMAD ALI KHAN
PAGE 556
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

6(a)(i) 1 mark for touchscreen being both 2


1 mark for remaining 3 devices

Device Input Output

Touchscreen 9 9

Webcam 9

Microphone 9

Fingerprint scanner 9

6(a)(ii) 1 mark for any 1 correct letter in the correct position 4


2 marks for any 2 correct letters in the correct positions
3 marks for any 3 correct letters in the correct positions
4 marks for 5 correct letters in the correct positions

C An electric current is sent to the speaker.

E The electric current passes through the coil.

The current in the coil creates an electromagnetic field.

A Changes in the audio signal cause the direction of the electrical current to
change. This determines the polarity of the electromagnet.

D The electromagnet is repelled by, or attracted to the permanent magnet.

The movement of the coil causes the diaphragm to vibrate.

B The vibration creates sound waves.

6(b)(i) To store files / software long term 1

6(b)(ii) 1 mark per bullet point to max 3 3

 No moving parts
 Solid state memory is non-volatile

 Makes use of blocks / arrays of


 « Semiconductors // NAND gates // NOR gates // transistors // integrated
circuits
 SSD Controller manages the components
 Uses a grid of columns and rows that has two transistors at each intersection
 One transistor is called a floating gate
 The second transistor is called the control gate
 Memory cells store voltages which can represent either a 0 or a 1
 Essentially the movement of electrons is controlled to read/write
 Not possible to overwrite existing data // it is necessary to first erase the old
data then write the new data in the same location

© UCLES 2019 Page 8 of 10


MUHAMMAD ALI KHAN
PAGE 557
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

6(c) 1 mark per bullet point to max 2 2

 RAM stores currently running parts of files / programs / processes / OS

 ROM stores boot up instructions / OS kernel // data permanently // store the


firmware for the tablet

6(d)(i) 1 mark per bullet point to max 4 4


Max 3 for image
Max 3 for sound

Images
 The images are stored as bitmaps
 Each image is made up of pixels
 « each pixel is of a single colour
 Each colour has a unique binary number
 Store the sequence of binary numbers for each image / frame // store the
binary value of each pixel

Sound
 Measure the height/amplitude of the sound wave
 A set number of times per second // at regular time intervals
 Each amplitude has a unique binary number
 Store the sequence of binary numbers for each sample

6(d)(ii) 1 mark per bullet point max 2 for each coding term. 4

Interlaced encoding
 The data from a single frame are encoded as two separate fields
 One containing the data for the even numbered rows / lines and the other
has the data for the odd numbered rows / lines
 The image is rendered by alternating between the even field and the odd
field of each successive frame
 The viewer sees data from two frames simultaneously
 The rate of picture display (the field rate) is twice the rate of image frame
display (the frame rate)
 Produces what appears to the eye to be a high refresh rate
 Halves the transmission bandwidth requirements

Progressive encoding
 Stores the data for an entire frame
 Displays all the frame data at the same time
 The rate of picture display is the same as the frame rate
 High bandwidth requirements

© UCLES 2019 Page 9 of 10


MUHAMMAD ALI KHAN
PAGE 558
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

6(e)(i) 1 mark per bullet to max 3 4

 The data is compressed before transmitting


 The video is transmitted continuously as a series of bits
 The video is hosted on a media server
 On download, the server sends the data to a buffer on the client computers //
The buffer stores the data from the server
 The recipient / user’s software receives bit stream from the buffer

6(e)(ii) 1 mark for: 2


On-demand

1 mark for justification from:


 The video does not need to be broadcast live // the video is already recorded
 Dominic’s colleagues will watch the video at a later date // at their
convenience

6(e)(iii) 1 mark per description 2

Temporal Redundancy
 Pixels in a sequence of consecutive video frames have the same value in
the same location

Spatial Redundancy
 A sequence of consecutive pixels in a single video frame have the same
value

© UCLES 2019 Page 10 of 10


MUHAMMAD ALI KHAN
PAGE 559

Cambridge Assessment International Education


Cambridge International Advanced Subsidiary and Advanced Level
* 1 9 3 6 5 5 4 5 5 9 *

COMPUTER SCIENCE 9608/13


Paper 1 Theory Fundamentals October/November 2019
1 hour 30 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 14 printed pages and 2 blank pages.

DC (SC/TP) 171632/4
© UCLES 2019 [Turn over
MUHAMMAD ALI KHAN
PAGE 560

1 In a supermarket, a self-checkout machine allows customers to scan the barcodes of products and
then pay for their shopping. These are an alternative to the traditional cashier-staffed checkout.

(a) The self-checkout machine has a touchscreen.

(i) Identify two other input devices that self-checkout machines have.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(ii) Identify two other output devices that self-checkout machines have.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

© UCLES 2019 9608/13/O/N/19


MUHAMMAD ALI KHAN
PAGE 561

(iii) The touchscreen uses capacitive technology.

The sequence of steps 1 to 6 describes the internal operation of the touchscreen.

The statements A, B, C and D are used to complete the sequence.

A Charge is drawn to the point of contact.


B The screen has a layer that stores an electrical charge.
C There is a change in the electrostatic field.
D The coordinates are sent to the touchscreen driver.

Write one of the letters A to D in each appropriate row to complete the sequence.

1 ............................

2 When the user touches the screen

3 ............................

4 ............................

5 The coordinates of the point of contact can be calculated.

6 ............................
[2]

(b) The self-checkout machines have primary storage.

(i) Give two reasons why the self-checkout machine needs primary storage.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(ii) The self-checkout machines use Static RAM (SRAM) for their cache.

The following table has statements about SRAM or Dynamic RAM (DRAM).

Tick () one box in each row to identify whether the statement is about SRAM or DRAM.

Statement SRAM DRAM


More expensive to make
Requires refreshing (recharging)
Made from flip-flops
[2]

© UCLES 2019 9608/13/O/N/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 562

(c) The self-checkout machines connect to a server that stores all the data for the supermarket.
This is a client-server network.

(i) Describe, using an example for the supermarket, the client-server network model.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) The supermarket is concerned about the security and integrity of the data on the server.

Identify two methods that can be used to minimise the security risk to the data, and one
method to protect the integrity of the data.

Security 1 ..........................................................................................................................

...........................................................................................................................................

Security 2 ..........................................................................................................................

...........................................................................................................................................

Integrity .............................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2019 9608/13/O/N/19


MUHAMMAD ALI KHAN
PAGE 563

2 /HRQDUGR·VPRELOHSKRQHKDVDQRSHUDWLQJV\VWHP 26 

(a) Describe the following key management tasks that the mobile phone operating system carries
out.

Process management ...............................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Memory management ...............................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

(b) Leonardo uses the mobile phone to record his voice.

(i) Describe how sound sampling is used by the mobile phone to encode the sound.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2019 9608/13/O/N/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 564

(ii) Leonardo records his voice twice. Each recording is the same length and has the same
sampling resolution.

The first recording has a sampling rate of 44 100 Hz. The second recording has a
sampling rate of 21 000 Hz.

Describe how the different sampling rates will affect the recording and the sound file.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) Leonardo transfers the recordings to his laptop computer. He uses sound editing
software to delete some sections of the recordings, and copy and paste to replicate other
sections.

Describe two other features of sound editing software Leonardo can use to edit the
recordings.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

© UCLES 2019 9608/13/O/N/19


MUHAMMAD ALI KHAN
PAGE 565

3 A hotel needs to record information about customers and their bookings.

(a) The hotel has two types of room: double and family. Each room has a unique room number.

The hotel stores information about the customers including their name, address and contact
details.

When a customer books a room, they give the start date and the number of nights they want
to stay. If a customer wants more than one room, each room must have a separate booking.
Each booking has an ID number.

The hotel creates a normalised, relational database to store the required information. There
are three tables:

• CUSTOMER
• ROOM
• BOOKING

(i) Complete the database design for the hotel by writing the attributes for each table.

CUSTOMER( .......................................................................................................................

...........................................................................................................................................

........................................................................................................................................ )

ROOM( ...............................................................................................................................

...........................................................................................................................................

........................................................................................................................................ )

BOOKING( .........................................................................................................................

...........................................................................................................................................

........................................................................................................................................ )
[3]

(ii) Identify the primary key for each table that you designed in part (a)(i).

CUSTOMER .........................................................................................................................

ROOM ..................................................................................................................................

BOOKING ...........................................................................................................................
[2]

© UCLES 2019 9608/13/O/N/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 566

(iii) Identify one foreign key in the tables that you designed in part (a)(i).

Table name ........................................................................................................................

Foreign key .......................................................................................................................


[1]

(b) The hotel wants to use a Database Management System (DBMS) to set up and manage the
database.

Describe, using examples, how the hotel can use the following DBMS tools:

Developer interface ..................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Query processor .......................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[5]

(c) The following table has four SQL scripts.

Tick () one box in each row to identify whether the script is an example of a Data Definition
Language (DDL) statement or a Data Manipulation Language (DML) statement.

Script DDL DML

CREATE TABLE FILMS

SELECT FilmID FROM FILMS

ALTER TABLE FILMS ADD PRIMARY KEY (FilmID)

CREATE DATABASE MYDATA


[2]

© UCLES 2019 9608/13/O/N/19


MUHAMMAD ALI KHAN
PAGE 567

4 (a) Convert the unsigned binary number 0101 1111 1100 into denary.

............................................................................................................................................. [1]

(b) &RQYHUWWKHGHQDU\QXPEHUïLQWRELWWZR·VFRPSOHPHQW

............................................................................................................................................. [1]

(c) &RQYHUWWKHWZR·VFRPSOHPHQWQXPEHULQWRGHQDU\

............................................................................................................................................. [1]

(d) Convert the Binary Coded Decimal (BCD) value 0110 0101 into denary.

............................................................................................................................................. [1]

(e) Convert the denary number 222 into hexadecimal.

............................................................................................................................................. [1]

© UCLES 2019 9608/13/O/N/19 [Turn over


MUHAMMAD ALI KHAN
PAGE 568

10

5 (a) Draw a logic circuit to represent the logic expression:

X = NOT (A OR C) OR (A AND NOT B)

B X

[5]

(b) Complete the truth table for the logic expression:

X = NOT (A OR C) OR (A AND NOT B)

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2019 9608/13/O/N/19


MUHAMMAD ALI KHAN
PAGE 569

14

7 The following table has descriptions of modes of addressing.

Complete the table by writing the name of the addressing mode for each description.

Addressing mode Description

Form the address by adding the given number to a base address. Load
the contents of the calculated address to the Accumulator (ACC).

Load the contents of the address held at the given address to ACC.

Load the contents of the given address to ACC.

Form the address from the given address + the contents of the Index
Register. Load the contents of the calculated address to ACC.

Load the given value directly to ACC.

[5]

© UCLES 2019 9608/13/O/N/19


MUHAMMAD ALI KHAN
PAGE 570

Cambridge Assessment International Education


Cambridge International Advanced Subsidiary and Advanced Level

COMPUTER SCIENCE 9608/13


Paper 1 Written Paper October/November 2019
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 9 printed pages.

© UCLES 2019 [Turn over


MUHAMMAD ALI KHAN
PAGE 571
9608/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

 the specific content of the mark scheme or the generic level descriptors for the question
 the specific skills defined in the mark scheme or in the generic level descriptors for the question
 the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

 marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
 marks are awarded when candidates clearly demonstrate what they know and can do
 marks are not deducted for errors
 marks are not deducted for omissions
 answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2019 Page 2 of 9


MUHAMMAD ALI KHAN
PAGE 572
9608/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

1(a)(i) 1 mark per input device to max 2 2

e.g.
 Barcode scanner / Infra-red scanner
 Pressure sensor
 RFID / chip reader
 Bank note scanner
 Pin / key pad
 Magnetic strip reader

1(a)(ii) 1 mark per output device to max 2 2

e.g.
 Speaker
 Printer
 LCD screen

1(a)(iii) 1 mark for at least two statements in the correct position, 2 marks for all 2
four statements in correct position.

1 B «. «.. (The screen has a layer that stores an electrical charge)


2 When the user touches the screen
3 A ««« (Charge is drawn to the point of contact)
4 C ««« (There is a change in the electrostatic field)
5 The coordinates of the point of contact can be calculated
6 D «««. (These coordinates are sent to the touchscreen driver)

1(b)(i) 1 mark per bullet point to max 2 2

 To store the files needed to boot the system


 To store parts of the self- checkout machine operating system
 To store the self-checkout machine software
 To store the intermediate data / running total for items purchased

1(b)(ii) 1 mark for at least one correct row, 2 marks for all three correct rows 2

Statement SRAM DRAM

More expensive to make 9

Requires refreshing (recharging) 9

Made from flip-flops 9

© UCLES 2019 Page 3 of 9


MUHAMMAD ALI KHAN
PAGE 573
9608/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

1(c)(i) 1 mark per bullet point to max 3 plus 1 mark for suitable example 4

 When a barcode on an item is scanned


 « the server performs any requested tasks // the server looks up the
details of the product
 The self-checkout machine is a client
 « that send requests to the server // the self-checkout machine asks
for, e.g. the price of the item
 The server returns the results of the request // the server returns e.g.
the item price
 Self-checkout machine displays e.g. price to the user

1(c)(ii) 1 mark for each security method to max 2, 1 mark for integrity 3

Security
 encryption
 access rights
 username and password // biometrics // user accounts
 backup // disk mirroring
 firewall
 Physical methods (e.g. CCTV, locked rooms etc.)

Integrity
 checksum
 parity
 validation on input

Question Answer Marks

2(a) 1 mark per bullet point to max 4 for each management task, max 6 in total 6

Process Management
 Manages the scheduling of processes
 « allows multi-tasking / multi-processing
 « ensures fair access
 « handles priorities
 Manages which resources the processes require
 Enables processes to share information
 Prevents interference between processes // resolution of conflicts

Memory Management
 Allocates memory to processes
 Ensures fair usage of memory
 Organises memory / by example
 Makes use of virtual memory
 Keep processes separate
 To release memory when a process stops

© UCLES 2019 Page 4 of 9


MUHAMMAD ALI KHAN
PAGE 574
9608/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

2(b)(i) 1 mark per bullet point to max 2 2

 The amplitude of the wave is measured


 « at set, regular time intervals
 The value is stored as a binary number

2(b)(ii) 1 mark per bullet point 2

 Sampling resolution of 44100 Hz takes more samples per second, so


the file size will be larger // Sampling resolution of 21000 Hz takes fewer
samples per second, so the file size will be smaller

 At a resolution of 44100 Hz, the sound recording is a closer / more


accurate representation of Leonardo's voice // At a resolution of 21000
Hz, the sound recording is a less accurate representation of Leonardo's
voice

2(b)(iii) 1 mark for naming a feature, 1 mark for description, max 2 marks for each 4
feature

e.g.
 Amplify
 ... Increase the volume of a section of sound

 Change pitch
 ... Increase/decrease frequency of section(s)

 Change sampling resolution


 « to change the accuracy of the sound / file size

Question Answer Marks

3(a)(i) 1 mark per table 3

 CUSTOMER table has at least customer ID, customer name, address


and contact details
 ROOM has at least room number, room type,
 BOOKING has at least booking ID, room number, customer ID, start
date, number of nights

CUSTOMER (CustomerID, Name, Address, ContactDetails)

ROOM (RoomNumber, RoomType)

BOOKING (BookingID, RoomNumber, CustomerID, StartDate,


NumberNights)

© UCLES 2019 Page 5 of 9


MUHAMMAD ALI KHAN
PAGE 575
9608/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

3(a)(ii) 1 mark for 1 or 2 correct Primary Keys, 2 marks for 3 correct Primary Keys 2

CUSTOMER: CustomerID

ROOM: RoomNumber

BOOKING: BookingID

3(a)(iii) 1 mark for both table name and Foreign Key 1

Table: BOOKING
Foreign Key: CustomerID / RoomNumber

3(b) 1 mark per bullet point to max 2 plus 1 mark for suitable example for each 5
DBMS tool

Developer Interface
 To create user friendly features e.g. forms to enter new bookings
 To create outputs e.g. report of bookings on a given date
 To create interactive features e.g. buttons and menus

Query processor
 To create SQL/QBE queries
 To search for data that meets set criteria, e.g. all bookings for next
week
 To perform calculations on extracted data, e.g. number of empty rooms
tomorrow

3c 1 mark for at least two correct rows, 2 marks for all four correct rows 2

Script DDL DML

CREATE TABLE FILMS 9

SELECT FilmID FROM FILMS 9

ALTER TABLE FILMS ADD PRIMARY KEY (FilmID) 9

CREATE DATABASE MYDATA 9

Question Answer Marks

4(a) 1532 1

4(b) 1111 0001 0001 1

4(c) 101 1

4(d) 65 1

4(e) DE 1

© UCLES 2019 Page 6 of 9


MUHAMMAD ALI KHAN
PAGE 576
9608/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

5(a) 1 mark for each correct gate 5

 A OR C
 NOT(A OR C)
 NOT B
 A AND NOT B
 Final OR

5(b) 1 mark for each pair of rows 4

A B C Working space X

0 0 0 1

0 0 1 0

0 1 0 1

0 1 1 0

1 0 0 1

1 0 1 1

1 1 0 0

1 1 1 0

© UCLES 2019 Page 7 of 9


MUHAMMAD ALI KHAN
PAGE 577
9608/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

6(a)(i) 1 mark per bullet point to max 3 3

 checkAnswer
 Math.floor // floor
 Math.random // random
 getElementById
 toString
 alert

6(a)(ii) 1 mark per bullet point 2

 12
 17 and 19

6(a)(iii) 14 1

6(a)(iv) 1 mark per bullet point to max 2 2

 Converts the number in the variable answer to a string


 Compares the value in userAnswer with the string value of answer
 The if determines which line is executed next

6(b) 1 mark per bullet point to max 4 4

 Using program libraries saves time


 « as she does not have to write some routines
 Program library routines should already be thoroughly tested
 « so, Willow can use them without having to spend time checking they
work / correcting errors
 Program library routines may perform complex tasks
 ... so, Willow won’t have to work out how to code them

© UCLES 2019 Page 8 of 9


MUHAMMAD ALI KHAN
PAGE 578
9608/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

7 1 mark for each correct addressing mode 5

Addressing Description
mode

Relative Form the address by adding the given number to a


base address. Load the contents of the calculated
address to the Accumulator (ACC).

Indirect Load the contents of the address held at the given


address to ACC.

Direct Load the contents of the given address to ACC.

Indexed Form the address from the given address + the


contents of the Index Register. Load the contents of the
calculated address to ACC.

Immediate Load the given value directly to ACC.

© UCLES 2019 Page 9 of 9


MUHAMMAD ALI KHAN
PAGE 579

Cambridge International AS & A Level


* 0 6 4 4 5 5 6 7 9 2 *

COMPUTER SCIENCE 9608/11


Paper 1 Theory Fundamentals May/June 2020
1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.

INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

DC (LEG/FC) 183147/3
© UCLES 2020 [Turn over
MUHAMMAD ALI KHAN
PAGE 580

1 A computer program makes use of data validation routines and verification of data input.

(a) Complete these two sentences about data validation and verification.

1. ................................................. checks that the data entered is reasonable. One example is

.................................................... .

2. ................................................. checks that the data entered is the same as the original. One

example is .................................................... .
[4]

(b) The program is installed on a computer system that has security measures in place to protect
its data.

Complete the following table.

Security measure Description

.............................................................
Data are written on two or more disks simultaneously.
.............................................................

.............................................................................................

.............................................................................................
Encryption
.............................................................................................

.............................................................................................

.............................................................
A copy of the data is taken and stored in another location.
.............................................................
[3]

© UCLES 2020 9608/11/M/J/20


MUHAMMAD ALI KHAN
PAGE 581

2 Kal teaches Computer Science and uses different devices when teaching his students.

(a) Tick () one or more boxes on each row to indicate whether each device is an input device,
an output device, or both.

Device Input Output

LCD monitor

Microphone

Keyboard

Touchscreen
[2]

(b) Kal has built a 3D printer to show students how it works.

(i) The steps 1 to 9 describe the basic internal operation of a 3D printer.

The following five statements are used to complete the sequence of steps.

A A stepper motor moves the nozzle into position

B A fan cools the layer

C The software splits the object into slices

D The nozzle extrudes the molten plastic

E The data about the slices is sent to the printer

Write one of the letters A, B, C, D or E in the appropriate step to complete the sequence.

1. The object is designed using Computer Aided Design (CAD) software

2. .....................................

3. .....................................

4. The solid plastic is melted and transferred to the nozzle

5. .....................................

6. .....................................

7. The steps 5 to 6 are repeated until the layer is complete

8. .....................................

9. The steps 4 to 8 are repeated for each subsequent layer


[4]

© UCLES 2020 9608/11/M/J/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 582

(ii) The 3D printer has both RAM and ROM.

Describe the purpose of RAM and ROM in a 3D printer.

RAM ..................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

ROM ..................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

© UCLES 2020 9608/11/M/J/20


MUHAMMAD ALI KHAN
PAGE 583

4 A digital camera takes a bitmap image. The image is 2000 pixels wide by 1000 pixels high with a
colour depth of 24-bits.

(a) Calculate an estimate of the file size for the image. Give your answer in megabytes. Show
your working.

Working .....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Answer .......................................................... MB
[3]

(b) A second image is taken, this time in black and white. It has the same number of pixels, but
the file size is smaller.

Explain why the file size is smaller.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) The digital camera allows a user to add text to an image. The text is encoded as ASCII
values.

The table shows the ASCII denary values for five characters.

Character ASCII denary value

a 97

b 98

c 99

d 100

e 101

(i) Give the 8-bit binary value for the ASCII character ‘b’.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2020 9608/11/M/J/20


MUHAMMAD ALI KHAN
PAGE 584

(ii) Complete the table by writing the ASCII denary value for the character ‘t’ and its
hexadecimal equivalent.

Character t

ASCII denary value

Hexadecimal value
[2]

© UCLES 2020 9608/11/M/J/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 585

5 (a) A logic circuit is given:

X
B

Complete the following truth table for the logic circuit.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2020 9608/11/M/J/20


MUHAMMAD ALI KHAN
PAGE 586

(b) Identify one logic gate not used in the logic circuit in part (a).

Draw the symbol for this logic gate and complete its truth table.

Logic gate: ......................................

Symbol:

Truth table: Input


Output
A B

0 0

0 1

1 0

1 1

[3]

© UCLES 2020 9608/11/M/J/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 587

10

6 A processor has one general purpose register, the Accumulator (ACC), and an Index Register
(IX).

(a) The table gives three assembly language instructions for loading data into the ACC. It also
identifies the addressing mode used for each instruction.

Instruction Addressing mode


A LDM #193 Immediate
B LDD 193 Direct
C LDX 193 Indexed

(i) State the contents of the Accumulator after each of the instructions A, B and C are run.

A ........................................................................................................................................

...........................................................................................................................................

B ........................................................................................................................................

...........................................................................................................................................

C ........................................................................................................................................

...........................................................................................................................................
[3]

(ii) Name two other addressing modes.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(b) The ACC is a general purpose register. The IX is a special purpose register.

Identify two other special purpose registers used in the fetch-execute cycle and describe
their role in the cycle.

Register 1 .................................................................................................................................

Role ..........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Register 2 .................................................................................................................................

Role ..........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]
© UCLES 2020 9608/11/M/J/20
MUHAMMAD ALI KHAN
PAGE 588

12

7 A driving school teaches people how to drive cars. The school has a relational database,
DRIVING_SCHOOL, to store information about instructors, students, lessons and the cars used by
instructors.

INSTRUCTOR(InstructorID, FirstName, LastName, DateOfBirth, Level)

CAR(Registration, Make, Model, EngineSize)

INSTRUCTOR_CAR(InstructorID, Registration)

STUDENT(StudentID, FirstName, LastName, DateOfBirth, Address1)

LESSON(LessonID, StudentID, InstructorID, LessonDate, LessonTime)

(a) Give two benefits to the driving school of using a relational database instead of a flat file.

1 .................................................................................................................................................

...................................................................................................................................................

2 .................................................................................................................................................

...................................................................................................................................................
[2]

(b) Complete the entity-relationship diagram for the database DRIVING_SCHOOL.

INSTRUCTOR INSTRUCTOR_CAR

LESSON CAR

STUDENT

[4]

© UCLES 2020 9608/11/M/J/20


MUHAMMAD ALI KHAN
PAGE 589

13

(c) The table shows some sample data for the table INSTRUCTOR.

InstructorID FirstName LastName DateOfBirth Level


Ins01 Jayden Han 05/06/1974 1
Ins02 Freda Choi 06/02/1978 2
Ins03 Kelly Kim 01/12/1966 1
Ins04 Santana Thompson 09/09/1985 3

Complete the Data Definition Language (DDL) statement to create the table INSTRUCTOR.

………………………………………………………………………… TABLE INSTRUCTOR(

InstructorID VARCHAR(5),

FirstName VARCHAR(15),

LastName VARCHAR(15),

DateOfBirth DATE,

Level ………………………………………………………………………… ,

………………………………………………………………………… (InstructorID)

);
[3]

(d) The table STUDENT needs an additional field to store the student’s telephone number, for
example 012-3456.

Write a Data Definition Language (DDL) statement to add the new field to the table STUDENT.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(e) Write a Data Manipulation Language (DML) statement to return the date and time of all future
lessons booked with the instructor whose InstructorID is Ins01.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]
© UCLES 2020 9608/11/M/J/20 [Turn over
MUHAMMAD ALI KHAN
PAGE 590

14

8 Bart plays computer games on his stand-alone games console.

The games console has an operating system.

(a) Describe the tasks performed by the operating system to manage the main memory in the
games console.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) The computer games are written in a high-level language. Bart does not need a compiler or
an interpreter to run the games he buys for his console.

Explain why the games run without the need for a compiler or an interpreter.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) When Bart is at work, he connects his work laptop to his employer’s Local Area Network
(LAN). The LAN has both a router and a gateway.

Give two similarities and one difference between a router and a gateway.

Similarity 1 ................................................................................................................................

...................................................................................................................................................

Similarity 2 ................................................................................................................................

...................................................................................................................................................

Difference .................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2020 9608/11/M/J/20


MUHAMMAD ALI KHAN
PAGE 591

15

9 Utility programs are examples of system software.

(a) Complete the table by writing the name of the utility program for each description.

Description Utility program

Reorganises files on a disk to improve efficiency

Scans a hard disk to identify bad sectors

Prepares a hard disk for first use

[3]

(b) File compression is one example of a utility program.

Tick () one box on each row to indicate whether the action is an example of lossy
compression or lossless compression.

Action Lossy Lossless


Reducing the resolution of an image
Using run-length encoding on a text file
Reducing the sampling rate of a sound file
[1]

© UCLES 2020 9608/11/M/J/20


MUHAMMAD ALI KHAN
PAGE 592

Cambridge International AS & A Level

COMPUTER SCIENCE 9608/11


Paper 1 Written Paper May/June 2020
MARK SCHEME
Maximum Mark: 75

Published

Students did not sit exam papers in the June 2020 series due to the Covid-19 global pandemic.

This mark scheme is published to support teachers and students and should be read together with the
question paper. It shows the requirements of the exam. The answer column of the mark scheme shows the
proposed basis on which Examiners would award marks for this exam. Where appropriate, this column also
provides the most likely acceptable alternative responses expected from students. Examiners usually review
the mark scheme after they have seen student responses and update the mark scheme if appropriate. In the
June series, Examiners were unable to consider the acceptability of alternative responses, as there were no
student responses to consider.

Mark schemes should usually be read together with the Principal Examiner Report for Teachers. However,
because students did not sit exam papers, there is no Principal Examiner Report for Teachers for the June
2020 series.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the June 2020 series for most Cambridge
IGCSE™ and Cambridge International A & AS Level components, and some Cambridge O Level
components.

This document consists of 10 printed pages.

© UCLES 2020 [Turn over


MUHAMMAD ALI KHAN
PAGE 593
9608/11 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2020 Page 2 of 10


MUHAMMAD ALI KHAN
PAGE 594
9608/11 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

1(a) 1 mark for each correctly completed term. 4

Validation checks that the data entered is reasonable. One example is a


presence check.
Verification checks that the data entered is the same as the original. One
example is double entry.

1(b) 1 mark for each correct entry 3

Security measure Description

Disk mirroring Data are written on two or more disks simultaneously.

Contents are scrambled so they cannot be


Encryption
understood without a decryption key

A copy of the data is taken and stored in another


Backup
location

Question Answer Marks

2(a) 1 mark for first three rows, 1 mark for the touchscreen being both. 2

Device Input Output

LCD Monitor 9

Microphone 9

Keyboard 9

Touchscreen 9 9

© UCLES 2020 Page 3 of 10


MUHAMMAD ALI KHAN
PAGE 595
9608/11 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

2(b)(i) 1 mark for 1 correct entry 4


2 marks for 2 correct entries
3 marks for 3 correct entries
4 marks for 5 correct entries

1 The object is designed using Computer Aided Design (CAD) software

2 C (The software splits the object into slices)

3 E (The data about the slices is sent to the printer)

4 The solid plastic is melted and transferred to the nozzle

5 A (A stepper motor moves the nozzle into position)

6 D (The nozzle extrudes the molten plastic)

7 The steps 5 to 6 repeat until the layer is complete

8 B (A fan cools the layer)

9 The steps 4 to 8 are repeated for each subsequent layer

2(b)(ii) 1 mark per bullet point. Max 3 for RAM, max 2 for ROM 4

RAM
• Stores currently running parts of the 3D printer software
• Stores the data about the layers being printed // contents of buffer
• Stores current progress of printing
• Stores the data about the printer, e.g. Plastic levels, nozzle position

ROM
• Stores the operating software for the 3D printer // OS for the 3D printer
• Stores the boot-up/start-up instructions for the 3D printer

Question Answer Marks

3(a) 1 mark per bullet point 2

• Outputs 12 // the result of 10 + 2


• In the object with the name "text 2"

3(b) 1 mark per bullet point 2

• Declares a function called calculateValue


• ... which takes two values as parameters

© UCLES 2020 Page 4 of 10


MUHAMMAD ALI KHAN
PAGE 596
9608/11 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

3(c) 1 mark per bullet point to max 2 2

• Assigns the value 2 to the variable $number1


• Outputs to the screen
• the result of $number1 to the power of 3

Question Answer Marks

4(a) 1 mark per bullet point 3

• 2000 * 1000 * 24 = 48 000 000 bits


• 48 000 000 / 8 / 1024 / 1024
• = 6 MB or 5.7 MB

4(b) 1 mark per bullet point to max 2 2

• Only 1 bit needed to store the colour of each pixel ...


• ... so number of pixels * bit depth is 2000 * 1000 * 1 (rather than 2000 *
1000 * 24)
• ... so the calculation (in part 4(a)) results in smaller figure for file size

4(c)(i) 0110 0010 1

4(c)(ii) 1 mark for each correct line 2

Character t

ASCII denary value 116

Hexadecimal value 74

© UCLES 2020 Page 5 of 10


MUHAMMAD ALI KHAN
PAGE 597
9608/11 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

5(a) 1 mark for each pair of correct answers (shaded) 4

A B C Working space X

0 0 0 0

0 0 1 1

0 1 0 1

0 1 1 0

1 0 0 1

1 0 1 1

1 1 0 0

1 1 1 0

© UCLES 2020 Page 6 of 10


MUHAMMAD ALI KHAN
PAGE 598
9608/11 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

5(b) 1 mark for name, 1 mark for symbol, 1 mark for truth table 3

• NAND

Input
Output
A B

0 0 1

0 1 1

1 0 1

1 1 0

• NOR

Input
Output
A B

0 0 1

0 1 0

1 0 0

1 1 0

Question Answer Marks

6(a)(i) 1 mark for each correct answer 3

A: The number 193

B: The data in memory location 193

C: The data in the memory location found by adding the contents of the IX to
193

6(a)(ii) 1 mark each correct answer 2

• Indirect
• Relative

© UCLES 2020 Page 7 of 10


MUHAMMAD ALI KHAN
PAGE 599
9608/11 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

6(b) 1 mark for correctly naming register, 1 mark for appropriate role 4

• Program counter // PC
• Stores the address of the next instruction to be fetched

• Memory address register // MAR


• Stores the address where data/instruction is to be read from or saved to

• Memory data register // MDR


• Stores data that is about to be written to memory // Stores data that has
just been read from memory

• Current instruction register // CIR


• Stores the instruction that is currently being decoded/executed

Question Answer Marks

7(a) 1 mark per bullet point to max 2 2

• Reduced data redundancy


• Reduced data dependency
• Improved data integrity
• Improved data privacy
• Program-data independence
• Ability to create ad hoc queries

7(b) 1 mark for each correct link 4

INSTRUCTOR INSTRUCTOR_CAR

LESSON CAR

STUDENT

© UCLES 2020 Page 8 of 10


MUHAMMAD ALI KHAN
PAGE 600
9608/11 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

7(c) 1 mark for each correctly completed statement 3

• CREATE (line 1)
• INTEGER (line 6)
• PRIMARY KEY (line 7)

CREATE TABLE INSTRUCTOR(


InstructorID VARCHAR(5),
FirstName VARCHAR(15),
LastName VARCHAR(15),
DateOfBirth DATE,
Level INTEGER,
PRIMARY KEY (InstructorID)
);

7(d) 1 mark per bullet point 2

• Alter table student


• Add an appropriate identifier with suitable data type

ALTER TABLE STUDENT


ADD TelNum VARCHAR;

7(e) 1 mark per bullet point 4

• Select lesson date and lesson time


• From table LESSON
• Where InstructorID = “Ins01”
• And lesson date is greater than today’s date

SELECT LessonDate, LessonTime


FROM LESSON
WHERE InstructorID = "Ins01"
AND LessonDate > #######;

Question Answer Marks

8(a) 1 mark per bullet point to max 4 4

• Reads/writes data to/from RAM


• … e.g. current data/instructions from a game so the CPU can access it

• Allocates virtual memory


• … when there is insufficient RAM to run a program/game

• Allocates RAM to optimise performance


• Paging
• Segmentation

© UCLES 2020 Page 9 of 10


MUHAMMAD ALI KHAN
PAGE 601
9608/11 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

8(b) 1 mark per bullet point to max 2 2

• Software will have been built using a compiler // the software is pre-
compiled
• Software is an executable file // the game is already in machine code //
the game is already set-up to run on the console
• Source code is not provided so does not need compiling/interpreting

8(c) 1 mark for each similarity, max 2 3

• Both devices regulate network traffic between two networks // connect


two networks
• Both receive packets from a network and both forward packets onto a
network

1 mark for a difference

• A Router connects two networks using the same protocol, a Gateway can
connect two networks using different protocols

Question Answer Marks

9(a) 1 mark for each correctly identified utility program 3

Description Utility program

Reorganises files on a disk to improve


Defragmentation software
efficiency

Scans a hard disk to identify bad Disk contents analysis / repair


sectors software

Prepares a hard disk for first use Disk formatter

9(b) 1 mark for 3 correct answers 1

Action Lossy Lossless

Reducing the resolution of an image 9

Using run-length encoding on a text file 9

Reducing the sampling rate of a sound file 9

© UCLES 2020 Page 10 of 10


MUHAMMAD ALI KHAN
PAGE 602

Cambridge International AS & A Level


* 8 9 6 4 5 1 8 2 1 7 *

COMPUTER SCIENCE 9608/12


Paper 1 Theory Fundamentals May/June 2020
1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.

INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

DC (RW/FC) 183148/3
© UCLES 2020 [Turn over
MUHAMMAD ALI KHAN
PAGE 603

1 Samira is creating an interactive, multimedia presentation for the entrance to her hotel.

(a) The presentation will be on a device that has a resistive touchscreen for user input.

Complete the following paragraph about the basic operation of a resistive touchscreen.

The resistive touchscreen has two layers with ...................................................... between

the layers. When a finger touches the screen, the ...................................................... moves

to touch the ...................................................... ; this creates a point of contact.

The ...................................................... and ...................................................... position of this

point is calculated.
[4]

(b) Samira uses a computer to draw a logo for her hotel and saves it as a vector graphic. The
logo will be placed on the multimedia presentation and elsewhere, such as on signs at the
entrance of the hotel.

Samira emails the logo to a company that prints signs, and other documentation for the hotel.

(i) Describe how the logo is represented by the computer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) State two reasons why the hotel logo is saved as a vector graphic instead of a bitmapped
graphic.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2020 9608/12/M/J/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 604

2 Amir has created a sound file using his desktop computer.

(a) Complete the table by writing the missing definitions and term about sound.

Term Definition

....................................................................................................................

....................................................................................................................
Sampling
....................................................................................................................

....................................................................................................................

......................................
The number of samples per unit time
......................................

....................................................................................................................

....................................................................................................................
Sampling resolution
....................................................................................................................

....................................................................................................................
[3]

(b) The file is too large to be emailed and the file size needs to be reduced.

(i) Name one lossless compression technique that can be used to reduce the size of the
sound file.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Describe one lossy compression technique that can be used to reduce the size of the
sound file.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2020 9608/12/M/J/20


MUHAMMAD ALI KHAN
PAGE 605

(c) Amir’s computer has system software, including utility software and an operating system.

(i) Explain how the disk formatter, disk contents analysis and disk repair utilities work
together.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) Amir’s computer has several peripheral devices connected to it.

State three peripheral management tasks performed by the operating system.

Task 1 ................................................................................................................................

...........................................................................................................................................

Task 2 ................................................................................................................................

...........................................................................................................................................

Task 3 ................................................................................................................................

...........................................................................................................................................
[3]

(iii) The peripheral devices are plugged into USB ports of the computer.

Describe two benefits of connecting the peripheral devices using a USB port.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

© UCLES 2020 9608/12/M/J/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 606

3 The following is a logic expression.

X = NOT (A AND B) OR NOT (NOT B OR C)

Draw the logic circuit for the given expression using a maximum of four gates.

B X

[4]

© UCLES 2020 9608/12/M/J/20


MUHAMMAD ALI KHAN
PAGE 607

4 Sophie is about to start a new job as a junior software developer.

(a) She is worried about joining a new team of people.

(i) State one ethical action that Sophie can take to help her to feel more confident about
starting work.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) State two ethical actions that Sophie’s manager can take to help Sophie to feel more
confident about starting work.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(iii) State one ethical action that Sophie’s new colleagues can take to help Sophie to feel
more confident about starting work.

...........................................................................................................................................

..................................................................................................................................... [1]

(b) Explain why Sophie is asked to sign a professional code of conduct before starting work.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2020 9608/12/M/J/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 608

5 (a) The steps 1 to 6 describe the first pass of a two-pass assembler.

The following three statements are used to complete the sequence of steps.

A If it is already in the symbol table, it checks to see if the absolute address is known

B When it meets a symbolic address, it checks to see if it is already in the symbol table

C If it is known, it is entered

Write one of the letters A, B or C in the appropriate step to complete the sequence.

1. The assembler reads the assembly language instructions

2. .........................

3. If it is not, it adds it to the symbol table

4. .........................

5. .........................

6. If it is not known, it is marked as unknown.


[2]

© UCLES 2020 9608/12/M/J/20


MUHAMMAD ALI KHAN
PAGE 609

(b) The assembler translates assembly code into machine code.

The table shows the denary values for three assembler op codes.

Op code Denary value


LDD 194
ADD 200
STO 205

(i) Convert the denary value for the op code LDD into 8-bit binary.

[1]

(ii) Convert the denary value for the op code STO into hexadecimal.

..................................................................................................................................... [1]

(iii) State why the denary value for the op code ADD cannot be represented in 8-bit two’s
complement form. Justify your answer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2020 9608/12/M/J/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 610

10

(c) The table shows part of the instruction set for a processor. The processor has one general
purpose register, the Accumulator (ACC), and an Index Register (IX).

Instruction
Explanation
Op code Operand
LDM #n Immediate addressing. Load the denary number n to ACC
Direct addressing. Load the contents of the location at the given address to
LDD <address>
ACC
Indexed addressing. Form the address from <address> + the contents of the
LDX <address>
Index Register. Copy the contents of this calculated address to ACC
LDR #n Immediate addressing. Load the denary number n to IX
STO <address> Store contents of ACC at the given address
ADD <address> Add the contents of the given address to ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP <address> Compare contents of the address given with the contents of ACC
JPE <address> Following a compare instruction, jump to <address> if the compare was True
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
OUT Output to screen the character whose ASCII value is stored in ACC
END Return control to the operating system

© UCLES 2020 9608/12/M/J/20


MUHAMMAD ALI KHAN
PAGE 611

11

Complete the trace table for the following assembly language program. The first instruction
has been completed for you.

Address Instruction Memory address


Instruction
20 LDD 103 ACC
address 100 101 102 103
21 CMP 101
22 JPE 30 1 2 3 0

23 LDD 100 20 0
24 ADD 101
25 STO 100
26 LDD 103
27 INC ACC
28 STO 103
29 JMP 20
30 END

100 1
101 2
102 3
103 0

[6]
© UCLES 2020 9608/12/M/J/20 [Turn over
MUHAMMAD ALI KHAN
PAGE 612

12

6 A software development company has a relational database, SOFTWARE_MANAGEMENT. The


database stores details of the customers who have purchased software, as well as the software
and licences that customers have purchased.

The SOFTWARE_MANAGEMENT database has the following tables:

CUSTOMER_DETAILS(CustomerID, CompanyName, Address1, Address2, City)

SOFTWARE_PURCHASED(SoftwareName, SoftwareDescription, CustomerID,


LicenceType, LicenceCost, RenewalDate)

(a) Explain why this database is not in Third Normal Form (3NF). Refer to the tables in your
answer.

Do not attempt to normalise the tables.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Give an example from the database SOFTWARE_MANAGEMENT for each of the following
database terms.

Term Example

Entity

Foreign key

Attribute

[3]

© UCLES 2020 9608/12/M/J/20


MUHAMMAD ALI KHAN
PAGE 613

13

(c) The company also develops computer games. They extend the relational database
SOFTWARE_MANAGEMENT by adding a new table. The new table, GAME_DEVELOPMENT,
stores details about the games and the software development teams creating them.

The table shows example data in GAME_DEVELOPMENT.

GameName Genre TeamNumber DevelopmentStage ManagerID

Bunny Hop Platform 4 Analysis 23KP

Fried Eggs Retro 2 Programming stage 1 9RTU

Create-a-game Action 1 Acceptance testing 11TF

(i) Complete the Data Definition Language (DDL) statement to create the table
GAME_DEVELOPMENT.

CREATE ………………………………………………………… ………………………………………………………… (

GameName VarChar,

Genre VarChar,

………………………………………………………… ………………………………………………………… ,

DevelopmentStage VarChar,

ManagerID VarChar,

………………………………………………………… (GameName)

);
[5]

(ii) Another table, PRODUCT_MANAGER, is created.

PRODUCT_MANAGER(ManagerID, FirstName, LastName)

Complete the Data Manipulation Language (DML) statement to return the game name,
genre and team number of all games managed by the product manager with the first
name ‘James’ and the last name ‘Fitz’.

………………………………………………………… GameName, Genre, TeamNumber

FROM GAME_DEVELOPMENT, PRODUCT_MANAGER

WHERE PRODUCT_MANAGER.FirstName = "James"

AND PRODUCT_MANAGER.LastName = "Fitz"

AND …………………………………………………………………………………………………

= …………………………………………………………………………………………………… ;
[3]
© UCLES 2020 9608/12/M/J/20 [Turn over
MUHAMMAD ALI KHAN
PAGE 614

14

7 A company allows customers to stream music from its servers over the Internet.
The company’s internet connection is currently provided through copper cables.

(a) Identify two pieces of hardware, other than the cables, that enable the servers to connect to
the Internet. Describe the purpose of each device.

Device 1 ....................................................................................................................................

Purpose ....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Device 2 ....................................................................................................................................

Purpose ....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(b) The company wants to upgrade their internet connection to fibre-optic cables.

Give one benefit and one drawback to the company of upgrading to fibre-optic cables.

Benefit ......................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Drawback ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2020 9608/12/M/J/20


MUHAMMAD ALI KHAN
PAGE 615

15

(c) A customer enters a song title into a web page to listen to the song. The design of the web
page is shown:

Company Name
Navigation Bar

Enter song title:

Search

The web page will make use of both client-side and server-side scripting.

(i) Explain how client-side scripting will be used in this web page.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) Explain how server-side scripting will be used after the customer clicks the ‘Search’
button.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2020 9608/12/M/J/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 616

16

(d) The company needs to keep the data on its servers secure from online threats.

(i) Describe how a firewall will help to protect the data on the servers from online threats.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Give one additional security measure that the company can use to protect the data on
the servers from online threats.

..................................................................................................................................... [1]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 9608/12/M/J/20


MUHAMMAD ALI KHAN
PAGE 617

Cambridge International AS & A Level

COMPUTER SCIENCE 9608/12


Paper 1 Written Paper May/June 2020
MARK SCHEME
Maximum Mark: 75

Published

Students did not sit exam papers in the June 2020 series due to the Covid-19 global pandemic.

This mark scheme is published to support teachers and students and should be read together with the
question paper. It shows the requirements of the exam. The answer column of the mark scheme shows the
proposed basis on which Examiners would award marks for this exam. Where appropriate, this column also
provides the most likely acceptable alternative responses expected from students. Examiners usually review
the mark scheme after they have seen student responses and update the mark scheme if appropriate. In the
June series, Examiners were unable to consider the acceptability of alternative responses, as there were no
student responses to consider.

Mark schemes should usually be read together with the Principal Examiner Report for Teachers. However,
because students did not sit exam papers, there is no Principal Examiner Report for Teachers for the June
2020 series.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the June 2020 series for most Cambridge
IGCSE™ and Cambridge International A & AS Level components, and some Cambridge O Level
components.

This document consists of 9 printed pages.

© UCLES 2020 [Turn over


MUHAMMAD ALI KHAN
PAGE 618
9608/12 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2020 Page 2 of 9


MUHAMMAD ALI KHAN
PAGE 619
9608/12 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

1(a) 1 mark for each correct term 4

The resistive touchscreen has two layers with a gap / an air gap between the
layers. When a finger touches the screen, the top layer moves to touch the
bottom layer; this creates a point of contact.
The horizontal and vertical position of this point is calculated.

1(b)(i) 1 mark per bullet point to max 3 3

• It is a series of (geometric) shapes / lines / objects


• Stored coordinates
• Contains a drawing list
• Commands / formulae for creating each individual object
• and the attributes/property for that object
• E.g. the colour, thickness of line etc.

1(b)(ii) 1 mark per bullet point to max 2 2

• Needs to be large for the signs without becoming pixelated.


• Smaller file size means faster transfer rates are possible.
• Smaller file size reduces storage requirements when stored many times
(on multiple documents).

Question Answer Marks

2(a) 1 mark for each correct term/definition 3

Term Definition

The amplitude of the analogue sound wave is


Sampling
recorded at regular/set intervals

Sampling rate The number of samples per unit time

Sampling resolution The number of bits used to store each sample

2(b)(i) 1 mark only from: 1

• Run-length encoding
• Huffman Coding
• Any other valid encoding method

2(b)(ii) 1 mark per bullet point to max 2 2

• Reduce sampling rate


• ... fewer samples taken per second means less data is being stored

Or

• Reduce sample resolution


• ... fewer bits are used to represent each sample, so less data is stored

© UCLES 2020 Page 3 of 9


MUHAMMAD ALI KHAN
PAGE 620
9608/12 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

2(c)(i) 1 mark per bullet point to max 3 3

• Disk contents analysis checks for errors/problems with the disk


• Disk repair attempts to fix the errors
• The disk formatter prepares the disk for (initial) use (again).

2(c)(ii) 1 mark per bullet point to max 3 3

• Installation of device driver software


• Managing interrupts / signals from the device
• Sending control signals to the device
• Control of buffers
• Management of queues

2(c)(iii) 1 mark for benefit, 1 mark for expansion for max 2 benefits 4

• Fast data transfer


• … useful when transferring large files such as video files

• Automatic connection / plug-and-play


• … so usually there is no need to install separate device drivers

• USB is a standard adopted by many manufacturers


• … meaning all new computers will be equipped with USB ports

• Devices may be powered or charged through USB


• … so external devices may be charged while working at the computer

Question Answer Marks

3 1 mark for each correct gate 4

X = NOT (A AND B) OR NOT (NOT B OR C)

4(a)(i) 1 mark only e.g. 1

• Read about the languages she will be using


• Visits the office prior to starting
• Speaks to her manager about concerns

© UCLES 2020 Page 4 of 9


MUHAMMAD ALI KHAN
PAGE 621
9608/12 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

4(a)(ii) 1 mark per action to max 2 2

For example:
• Prepare an induction
• Invite Sophie in before starting
• Introduce Sophie to the team
• Give Sophie a mentor

4(a)(iii) 1 mark only e.g. 1

• Prepare a greeting/introduction
• Provide structured support
• Invite Sophie to social event(s) before/at the start to meet people

4(b) 1 mark per bullet point to max 3 3

• Sophie is confirming that she understands the code of conduct


• To make sure Sophie knows what behaviour is expected of her
• To make sure Sophie understands there may be consequences of some
actions
• To ensure all employees adhere to the same standards

Question Answer Marks

5(a) 1 mark for one letter in the correct place, 2 marks for all three correct 2

2 B
4 A
5 C

5(b)(i) 11000010 1

5(b)(ii) CD 1

5(b)(iii) 1 mark per bullet point to max 2 2

• The maximum range for an 8-bit two's complement binary number is í128
to +127
• … 200 is outside of the maximum range

© UCLES 2020 Page 5 of 9


MUHAMMAD ALI KHAN
PAGE 622
9608/12 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

5(c) 1 mark for each highlighted section block 6

Instruction Memory address


address ACC
100 101 102 103

1 2 3 0

20 0

21

22

23 1

24 3

25 3

26 0

27 1

28 1

29

20 1

21

22

23 3

24 5

25 5

26 1

27 2

28 2

29

20 2

21

22

30

© UCLES 2020 Page 6 of 9


MUHAMMAD ALI KHAN
PAGE 623
9608/12 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

6(a) 1 mark per bullet point to max 2 2

• There are partial dependencies in the SOFTWARE_PURCHASED table //


SoftwareDescription is dependent only on SoftwareName and not
both SoftwareName and CustomerID

• There is a non-key dependency in the SOFTWARE_PURCHASED table //


LicenceCost is dependent on LicenceType

6(b) 1 mark for a suitable example for each 3

Term Example

Entity SOFTWARE_PURCHASED //CUSTOMER_DETAILS

CustomerID
Foreign Key
(in SOFTWARE_PURCHASED table)

Attribute Any valid example of an attribute from the tables

6(c)(i) 1 mark for each correct entry (in bold) 5

CREATE TABLE GAME_DEVELOPMENT (


GameName VarChar,
Genre VarChar,
TeamNumber Integer,
DevelopmentStage VarChar,
ManagerID VarChar,
PRIMARY KEY (GameName)
);

6(c)(ii) 1 mark for each correct entry (shown in brackets) 3

SELECT (1) GameName, Genre, TeamNumber


FROM GAME_DEVELOPMENT, PRODUCT_MANAGER
WHERE PRODUCT_MANAGER.FirstName = "James"
AND PRODUCT_MANAGER.SecondName = "Fitz"
AND PRODUCT_MANAGER.ManagerID (1)
= GAME_DEVELOPMENT.ManagerID (1) ;

© UCLES 2020 Page 7 of 9


MUHAMMAD ALI KHAN
PAGE 624
9608/12 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

7(a) 1 mark for device, 1 mark for matching purpose. Max 2 devices. 4

• Router
• To connect (devices) / the servers to the Internet // to transmit data
between the servers and the Internet // to forward data towards its
destination

• Gateway
• To connect a server that uses a different protocol to the Internet // to join
two different types of network

• Modem
• To connect (the servers) to the Internet over a telephone line

• Network interface card // NIC


• To enable the servers to connect to the (company) network

7(b) 1 mark per bullet point, max 1 for benefit, max 1 for drawback 2

Benefit:
• (Consistently) faster data transmission
• More stable connection

Drawback:
• High initial cost as new hardware will be needed
• Expertise required to complete connections

7(c)(i) 1 mark per bullet point to max 3 3

• The web page may have interactive features


• Created using JavaScript
• E.g. text box, buttons
• Validates the input client-side
• Handles the data returned from the server-side script

7(c)(ii) 1 mark per bullet point to max 3 2

• Database on the server is accessed


• Using PHP
• Searches for the data the user entered
• Returns the song // Returns a message to say song not found

7(d)(i) 1 mark per bullet point to max 2 2

• Prevents unauthorised access to the data


• Monitors incoming and outgoing traffic
• Blocks transmissions from unauthorised sources / websites / ports
• Maintains an allow list / deny list of IP addresses

© UCLES 2020 Page 8 of 9


MUHAMMAD ALI KHAN
PAGE 625
9608/12 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

7(d)(ii) 1 mark only from: 1

• Running up-to-date antivirus software


• Use of proxy server
• Strong / Biometric passwords
• Etc.

© UCLES 2020 Page 9 of 9


MUHAMMAD ALI KHAN
PAGE 626

Cambridge International AS & A Level


* 2 8 4 6 0 9 3 3 7 7 *

COMPUTER SCIENCE 9608/13


Paper 1 Theory Fundamentals May/June 2020
1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.

INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

DC (LEG/FC) 183149/3
© UCLES 2020 [Turn over
MUHAMMAD ALI KHAN
PAGE 627

1 Ana owns a small company with four employees. The office has a network containing several
computers that run on a client-server model. There is one server that connects to the Internet
using a router.

(a) Networks transmit data using various types of connection shown in the following table.

Complete the table.

Type of connection Description

..................................................................................................

..................................................................................................
Fibre-optic
..................................................................................................

..................................................................................................

............................................... A communication device in Earth’s orbit that receives and


transmits data
...............................................

..................................................................................................

..................................................................................................
Radio waves
..................................................................................................

..................................................................................................

............................................... Carries data as electrical signals and can consist of a twisted


pair
...............................................
[4]

(b) Explain how the client-server model enables the employees to access the same files from
different computers.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2020 9608/13/M/J/20


MUHAMMAD ALI KHAN
PAGE 628

(c) Each computer in the network has a private IP address.

Give two reasons why the computers do not have public IP addresses.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2020 9608/13/M/J/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 629

2 Billy has a laser printer.

(a) Complete the following description of the basic internal operation of a laser printer.

The printer uses a .............................................. and a rotating ..............................................

to draw the contents of the page on the photosensitive drum as ..............................................

charge. The .............................................. is attracted to this charge.


[4]

(b) The laser printer has both RAM and ROM.

Describe the purpose of RAM and ROM in the laser printer.

RAM ..........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

ROM .........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(c) Billy’s computer has several ports.

(i) State the purpose of a port.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Identify one type of port.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2020 9608/13/M/J/20


MUHAMMAD ALI KHAN
PAGE 630

3 (a) The following is a logic expression.

X = NOT(A OR B) OR (A AND (B XOR C))

Draw the logic circuit for the given expression, using a maximum of four logic gates.

B
X

[4]

© UCLES 2020 9608/13/M/J/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 631

(b) Complete the truth table for the logic expression:

X = NOT(A OR B) OR (A AND (B XOR C))

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

(c) The following is a logic expression.

A AND B XOR C OR NOT A

Identify one logic gate that would not be used in the logic circuit for this expression.
Draw the symbol for the logic gate.

Logic gate .................................................................................................................................

Logic gate symbol:

[2]

© UCLES 2020 9608/13/M/J/20


MUHAMMAD ALI KHAN
PAGE 632

4 Annchi is writing a computer game with a group of friends.

(a) One of her friends has suggested using Dynamic Link Library (DLL) files to help them develop
the game.

(i) Give three reasons why Annchi and her friends should use DLL files when developing
the game.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

(ii) Give two reasons why Annchi and her friends should not use DLL files when developing
the game.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(b) Each member of the group is creating a different part of the game. Each person needs to test
their part of the game independently before they are combined.

Identify the most appropriate type of translator that should be used to test each part of the
game independently. Justify your choice.

Translator ..................................................................................................................................

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2020 9608/13/M/J/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 633

(c) Annchi needs to decide which type of software licence to use for the game.

(i) Give two benefits to Annchi of using a commercial licence.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(ii) Give one benefit to the customers of the game being released using a commercial
licence.

...........................................................................................................................................

..................................................................................................................................... [1]

(iii) Describe one benefit to the customers of the game being released using a shareware
licence.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2020 9608/13/M/J/20


MUHAMMAD ALI KHAN
PAGE 634

5 Wei is developing a program.

(a) He wants to make sure the source code is secure on his laptop.

Explain how encrypting the source code can keep it secure.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Wei wants to compress the source code to transport it to another computer.

Identify the most appropriate compression technique he should use.

Justify your choice.

Compression technique ............................................................................................................

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2020 9608/13/M/J/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 635

10

6 Sheila creates a relational database for her hotel using a Database Management System (DBMS).

(a) Draw one line from each database term to its most appropriate description.

Database Term Description

A field in one table that links to a primary key in another table

Primary key
A collection of records and fields

Attribute
The type of data that is being stored

Foreign key A unique identifier for each tuple

A data item, represented as a field within a table


Entity

The concept or object in the system that we want to model


and store information about

[4]

(b) Identify three tasks that Sheila can perform using the DBMS developer interface.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2020 9608/13/M/J/20


MUHAMMAD ALI KHAN
PAGE 636

11

(c) Sheila creates the database HOTEL with the following table structure:

ROOM(RoomNumber, RoomType)

BOOKING(BookingID, RoomNumber, CustomerID, StartDate)

CUSTOMER(CustomerID, FirstName, LastName, Address, Tel_Num)

(i) The following table shows some sample data for the table ROOM.

RoomNumber RoomType
1 Standard
2 Double
3 Executive
4 Standard

Complete the Data Definition Language (DDL) statement to create the table ROOM.

................................................ TABLE ROOM(

RoomNumber Integer,

RoomType ................................................,

................................................ (RoomNumber)

);
[3]

(ii) Room number 5 is a Double room.

Complete the Data Manipulation Language (DML) statement to add the details for room
number 5 to the table ROOM.

INSERT ................................................ ROOM

VALUES(......................................................................................................);
[2]

(iii) The table BOOKING needs an additional field to store the number of nights (for example,
3) a customer is staying.

Write a Data Definition Language (DDL) statement to add the new field to the table
BOOKING.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]
© UCLES 2020 9608/13/M/J/20 [Turn over
MUHAMMAD ALI KHAN
PAGE 637

12

7 Xiaoming created the following logo using bitmapped graphics software.

PJF
Interiors

(a) Describe how one typical feature of bitmapped graphics software was used to create the
logo.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) The finished logo is 160 pixels wide and 160 pixels high. The image has a colour depth of
3 bytes per pixel.

Calculate an estimate of the file size for the logo. Give your answer in kilobytes. Show your
working.

Working .....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Answer ........................................................ KB
[3]

(c) Xiaoming needs to use his logo on his business card, on his website and on large display
boards. He is told that he should have created a vector graphic logo instead of a bitmapped
graphic logo.

Describe one benefit of creating a vector graphic logo instead of a bitmapped graphic logo.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2020 9608/13/M/J/20


MUHAMMAD ALI KHAN
PAGE 638

13

(d) The hexadecimal colour value of the background of Xiaoming’s website is:

913C8E

Complete the following table by converting each hexadecimal value to denary value.

Red Green Blue

Hexadecimal value 91 3C 8E
Denary value
[2]

© UCLES 2020 9608/13/M/J/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 639
9608/13 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

1(a) 1 mark for each correctly completed media or description 4

Type of connection Description

Transmits data as light //


Fibre-optic Uses (a bundle of) glass/plastic threads to
transmit data

A communication device in Earth’s orbit that


Satellite
receives and transmits data

Carries data wirelessly, often known as Wi-Fi //


Radio Waves Carries data in the form of electromagnetic
waves

Carries data as electrical signals and can consist


Copper cable
of a twisted pair

1(b) 1 mark per bullet point to max 2 2

• The employees’ computers are the clients


• The server hosts the (shared) files
• An employee can request a file (from the server) from any of the client
computers
• Several employees can access the same file (on the server) at the same time

1(c) 1 mark per bullet point 2

• Improved security because the IP address is not visible outside the network
• An internet presence is not required for each employee computer
• Only the router needs a public IP address, as only the router needs to be
externally visible
• Reduces number of (public) IP addresses needed

Question Answer Marks

2(a) 1 mark for each appropriate term 4

The printer uses a laser (beam) and a rotating mirror to draw the contents of the
page on the photosensitive drum as an electrostatic charge. The toner is attracted
to this charge.

© UCLES 2020 Page 3 of 9


MUHAMMAD ALI KHAN
PAGE 640
9608/13 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

2(b) 1 mark per bullet point. Max 2 for RAM, max 2 for ROM 4

RAM
• Stores currently running parts of the printer software
• Stores the data being printed // contents of buffer
• Stores current progress of printing
• Stores the data about the printer, e.g. toner levels

ROM
• Stores the printer operating software // OS for the printer
• Stores the boot-up/start-up instructions for the printer
• Printer fonts stored in ROM

2(c)(i) 1 mark 1

• To provide the connection to peripheral devices


• To provide an interface between the computer and other devices

2(c)(ii) 1 mark 1

• USB
• HDMI
• SCSI
• Firewire
• Ethernet
• Any other acceptable port

Question Answer Marks

3(a) 1 mark per correct gate 4

• A NOR B
• B XOR C
• A AND (B XOR C)
• Final OR

© UCLES 2020 Page 4 of 9


MUHAMMAD ALI KHAN
PAGE 641
9608/13 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

3(b) 1 mark for each correct pair of answers (4 shaded sections) 4

A B C Working Space X

0 0 0 1

0 0 1 1

0 1 0 0

0 1 1 0

1 0 0 0

1 0 1 1

1 1 0 1

1 1 1 0

3(c) 1 mark for name, 1 mark for symbol matching the name 2

NAND

NOR

Question Answer Marks

4(a)(i) 1 mark per reason to max 3 3

• DDL file is only loaded into memory when required


• ... so the executable file for the game is smaller
• Changes/improvements in the DLL file are independent of the main program
• ... the game program will not need to be recompiled
• ... the game program will get the benefit of the updates automatically
• The same DDL file can be used in several game programs (at the same time)

• (DLL) routines are pre-written saving the developers time


• (DLL) routines are pre-tested so should be reliable
• Developers can take advantage of other programmers’ expertise

4(a)(ii) 1 mark per reason to max 2 2

• Game will not work if DDL is corrupted


• An external change to the DDL could stop the game working or change the way
it works
• The DDL file must be present at run-time otherwise there is an error

© UCLES 2020 Page 5 of 9


MUHAMMAD ALI KHAN
PAGE 642
9608/13 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

4(b) 1 mark for interpreter 3

1 mark per bullet point for justification to max 2

• The interpreter translates and executes line by line


• The interpreter stops translation when an error is found
• …the error can be corrected, and the program continues running from where it
stopped
• There is no need for an executable file (at this stage)

4(c)(i) 1 mark per benefit to max 2 2

• She can charge a fee for the game


• She retains the copyright
• ... so, the game cannot be re-distributed by a third-party without her permission

4(c)(ii) 1 mark per benefit to max 1 1

• Potentially better support, as she is charging a fee


• Likely to have fewer bugs / less prone to malware than if distributed under other
licences e.g. open source
• Redress available if the game does not function correctly

4(c)(iii) 1 mark per bullet point 2

• They can check it works // check if it meets their requirements


• ... without having to paying a fee if it does not

Question Answer Marks

5(a) 1 mark per bullet point to max 3 3

• Encryption scrambles the source code (so it is meaningless)


• … using an encryption key / algorithm
• If the file is accessed without authorisation it will be meaningless
• It requires a decryption key / algorithm to unscramble

5(b) 1 mark for a lossless technique 3


1 mark per bullet point for justification to max 2

• Lossless does not lose any data


• Any lost data will mean the program will not work

© UCLES 2020 Page 6 of 9


MUHAMMAD ALI KHAN
PAGE 643
9608/13 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

6(a) 1 mark for each correct line 4

Database Term Description

A field in one table that links to a primary key


in another table

Primary key
A collection of records and tables

Attribute
The type of data that is being stored

Foreign key
A unique identifier for each tuple

A data item, represented as a field within a


Entity
table

The concept or object in the system that we


want to model and store information about

6(b) 1 mark per task to max 3 3

• Create a table
• Set up relationships between tables
• Create / design a form
• Create / design a report
• Create / design a query (NOT run a query)

6(c)(i) 1 mark for each completed line 3

CREATE TABLE ROOM(


RoomNumber Integer,
RoomType Varchar,
PRIMARY KEY (RoomNumber)
);

6(c)(ii) 1 mark for each completed line 2

INSERT INTO ROOM


VALUES (5,"Double");

© UCLES 2020 Page 7 of 9


MUHAMMAD ALI KHAN
PAGE 644
9608/13 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

6(c)(iii) 1 mark per bullet point 2

• Alter table booking


• Add number of nights with appropriate field name and data type

ALTER TABLE BOOKING


ADD NumberNights Integer;

Question Answer Marks

7(a) 1 mark for each feature and 1 mark for further related expansion to max 2 2

• Colour select
• Select all pixels of the same colour

• Add text
• To show the name of the company

• Resize the star shape


• To fit the space available in the box

• Fill an area with colour


• To shade the side of the box

• Select
• ‘Grab’ a number of pixels to perform a task with/to

• Copy
• Replicate a number of pixels

7(b) 1 mark per bullet point 3

• 160 * 160 (= 25600 pixels)


• 25600 * 3 (= 76800 bytes)
• 75 KB (divide by 1024) or 76.8 KB (divide by 1000)

7(c) 1 mark per bullet point to max 2 2

• The logo can be enlarged without becoming pixelated


• because the instructions to create the logo are stored
or
• (Usually) smaller file size
• only coordinates and calculations stored instead of individual pixels

© UCLES 2020 Page 8 of 9


MUHAMMAD ALI KHAN
PAGE 645
9608/13 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

7(d) 1 mark for 1 or 2 correct answers 2


2 marks for 3 correct answers

Red Green Blue

Hexadecimal value 91 3C 8E

Denary value 145 60 142

7(e)(i) 1 mark 1

Displays a message box containing the text ‘Error’

7(e)(ii) 1 mark per bullet point 2

• Assigns to the variable Value


• the contents of the object "FirstBox"

7(e)(iii) 1 mark per bullet point 2

• Writes the text "Agreed"


• To the object with Id paragraph1

© UCLES 2020 Page 9 of 9


MUHAMMAD ALI KHAN
PAGE 646

Cambridge International AS & A Level


* 1 2 4 3 8 1 3 2 4 9 *

COMPUTER SCIENCE 9608/11


Paper 1 Theory Fundamentals October/November 2020
1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.

INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

DC (CJ) 188576/2
© UCLES 2020 [Turn over
MUHAMMAD ALI KHAN
PAGE 647

1 Draw one or more lines to link each language translator to the most appropriate statement(s).

Language translator Statements

Converts a low-level language


instruction into binary

Stops as soon as it finds a syntax error

Compiler
Needs the source code to be present
when the user’s program is run

Reports all errors found at the end of


the process

Corrects syntax errors as they are


detected
Interpreter

Converts a high-level language into a


different form

Creates an executable file

[3]

© UCLES 2020 9608/11/O/N/20


MUHAMMAD ALI KHAN
PAGE 648

2 A veterinary surgery cares for sick animals. The surgery has a file-based database that stores
data about the pets, their owners, and appointments made with the surgery.

The surgery wants to upgrade to a relational database.

(a) Explain the reasons why the surgery should upgrade their database.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) The design for the surgery database, SURGERY, is:

PET(PetID, OwnerFirstName, OwnerLastName, PetName, PetBreed,


PetDateOfBirth, TelephoneNumber)

APPOINTMENT(AppointmentID, Date, Time, StaffID, PetID)

(i) Give one reason why the database design for SURGERY is not in Third Normal Form
(3NF).

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2020 9608/11/O/N/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 649

(ii) The database needs to be normalised to 3NF. A pet may have more than one owner and
an owner may have more than one pet.

The appointment table does not need to change and has been repeated below.

Give the name and attributes of three additional tables in 3NF. Identify the primary
key(s) in each table.

APPOINTMENT(AppointmentID, Date, Time, StaffID, PetID)

Table 1 ...............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Table 2 ...............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Table 3 ...............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

(c) Part of the table APPOINTMENT is shown. The veterinary surgery uses Data Manipulation
Language (DML) statements to search for appointments.

AppointmentID Date Time StaffID PetID


222010 02/02/2021 12:40 JK1 20CF
222011 02/02/2021 12:40 PP2 10DT
222012 02/02/2021 12:50 JK1 9RR
222013 02/02/2021 13:00 JK1 7MR

(i) Identify the industry standard language that provides both DML and Data Definition
Language (DDL) statements.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2020 9608/11/O/N/20


MUHAMMAD ALI KHAN
PAGE 650

(ii) Write a DDL statement to update the table APPOINTMENT and define AppointmentID
as the primary key.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) Complete the DML script to display the times and Pet IDs of all appointments on
02/02/2021 with staff ID of ‘JK1’, in descending order of time.

SELECT ........................................................ , ........................................................

FROM APPOINTMENT

WHERE ........................................................ AND ........................................................

ORDER BY Time ........................................................ ;


[3]

(d) New pet owners complete a paper-based form to register their pets at the surgery.

(i) Describe two verification checks that can be carried out when the data from the paper-
based form is entered into the database.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

© UCLES 2020 9608/11/O/N/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 651

(ii) Appointments can be booked between 09:00 and 16:50 on Monday to Friday.

Describe the ways in which the appointment date and time can be validated to make
sure they are reasonable.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(e) The surgery has five computers that can all access the database. A copy of the database is
stored centrally.

(i) Complete the description of this type of network model by filling in the missing terms.

The ......................................... model has one ......................................... that stores all

the data for the surgery. The other computers are ......................................... . When a

user requests data, a request is sent to the ......................................... .


[4]

(ii) The surgery wants to keep all data secure. The surgery network is not connected to the
Internet.

Identify two authentication techniques the surgery could use to restrict access to the
data.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

© UCLES 2020 9608/11/O/N/20


MUHAMMAD ALI KHAN
PAGE 652

3 Ria manages a team of software developers. The team is creating a mobile application game for a
client.

Ria wants to ensure that her team works to the ACM/IEEE Software Engineering Code of Ethics.

(a) Explain the ways in which Ria and her team can ensure that they follow the Code of Ethics in
relation to the product and their colleagues.

(i) Product

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Colleagues

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(b) Ria’s client wants to sell the game for a profit. The client cannot decide which type of software
licence to use to distribute the game.

Identify two types of licence that Ria could recommend to her client and justify the use of
each licence.

Licence 1 ..................................................................................................................................

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Licence 2 ..................................................................................................................................

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2020 9608/11/O/N/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 653

4 The following table shows assembly language instructions for a processor that has one general
purpose register, the Accumulator (ACC).

Instruction
Explanation
Op code Operand
Direct addressing. Load the contents of the location at the given address to
LDD <address>
ACC.
LDM #n Immediate addressing. Load the denary number n to ACC.
Indirect addressing. The address to be used is at the given address. Load
LDI <address>
the contents of this second address to ACC.
CMP <address> Compare the contents of ACC with <address>.

STO <address> Store contents of ACC at the given address.

ADD <address> Add the contents of the given address to ACC.

SUB <address> Subtract the contents of the given address from the contents of ACC.

OUT Output to screen the character whose ASCII value is stored in ACC.

INC <register> Add 1 to the contents of the register (ACC or IX).

JPE <address> Following a compare instruction, jump to <address> if the compare was True.

END Return control to the operating system.

(a) The current contents of the main memory are:

Address Instruction
100 LDD 200
101 ADD 201
102 ADD 202
103 SUB 203
104 STO 204
105 END

200 10
201 20
202 5
203 6
204
205

© UCLES 2020 9608/11/O/N/20


MUHAMMAD ALI KHAN
PAGE 654

Tick () one box to indicate which one of the following statements is true after program
execution.

Statements Tick ()


Memory location 204 contains 400
Memory location 204 contains 41
Memory location 204 contains 231
Memory location 204 contains 29
[1]

(b) The current contents of the main memory are:

Address Instruction
100 LDM #120
101 ADD 121
102 SUB 122
103 STO 120
104 END

120 10
121 2
122 4
123 6
124 8
125 10

Tick () one box to indicate which one of the following statements is true after program
execution.

Statement Tick ()


Memory location 120 contains 135

Memory location 120 contains 118

Memory location 120 contains 0

Memory location 120 contains 16


[1]

© UCLES 2020 9608/11/O/N/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 655

10

(c) The current contents of the main memory are:

Address Instruction
150 LDI 200
151 ADD 200
152 ADD 201
153 STO 205
154 END

200 202
201 203
202 201
203 200
204
205

Tick () one box to indicate which one of the following statements is true after program
execution.

Statement Tick ()


Memory location 205 contains 607

Memory location 205 contains 601

Memory location 205 contains 603

Memory location 205 contains 606


[1]

(d) Identify two modes of addressing that are not used in parts (a), (b) or (c).

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

© UCLES 2020 9608/11/O/N/20


MUHAMMAD ALI KHAN
PAGE 656

11

(e) Assembly language instructions can be put into groups.

Tick () one box on each row to indicate the appropriate instruction group for each assembly
language instruction.

Assembly language Data Jump Input and


Arithmetic
instruction movement instruction output of data

STO 120

JPE 200

ADD 3

LDD 20

INC ACC

OUT

[3]

© UCLES 2020 9608/11/O/N/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 657

12

5 Oscar is watching a concert on his laptop computer.

(a) The concert is streamed to his computer at the same time as it is taking place.

(i) Identify whether Oscar is using real-time or on-demand bit streaming. Justify your choice.

Streaming method .............................................................................................................

Justification .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

(ii) The video of the concert repeatedly stops and restarts while Oscar is watching it on his
laptop computer. His friend is watching the same video of the concert at the same time,
in a different location, but he does not experience the same problem as Oscar.

Give three possible reasons why Oscar’s video constantly stops and starts again.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2020 9608/11/O/N/20


MUHAMMAD ALI KHAN
PAGE 658

13

(b) The video of the concert is made up of a sound track and multiple images.

Two successive frames of one section of the video are shown. The pixel colours are
represented by letters.

BL BL BL RD RD RD BL BL BL RD RD RD

K K K K K K BL BL BL RD RD RD

LG LG LG DG DG DG LG LG LG DG DG DG

Y Y K Y Y K BK BK BK BK BK BK

W K W W W DG W K W W W DG

P P P P P P P P P P P P

Frame 1 Frame 2

(i) Explain the way in which progressive encoding can be used to transmit Frames 1 and 2.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Explain, using Frames 1 and 2 as an example, the way in which temporal redundancy
can be used to compress a video.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(iii) Give another type of redundancy technique that can be used to compress a video.

...........................................................................................................................................

..................................................................................................................................... [1]

(iv) MP4, WMV and AVI are all examples of a type of format that combines sound and image
components into a video.

Identify the type of format that combines the sound and image components into a video.

...........................................................................................................................................

..................................................................................................................................... [1]
© UCLES 2020 9608/11/O/N/20 [Turn over
MUHAMMAD ALI KHAN
PAGE 659

14

6 (a) Convert the following denary number into a 12-bit two’s complement binary form.

-245

[1]

(b) Convert the following hexadecimal number into denary.

F0

...................................................................................................................................................

............................................................................................................................................. [1]

(c) Convert the following unsigned binary integer into denary.

10101111

...................................................................................................................................................

............................................................................................................................................. [1]

(d) Convert the following Binary Coded Decimal (BCD) into denary.

100001010011

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2020 9608/11/O/N/20


MUHAMMAD ALI KHAN
PAGE 660

15

7 Anne is downloading a sound file from a web server. She had the choice of a sampling rate of
44.1 kHz or 98 kHz before she downloaded the sound file.

Explain the differences between the two sound files stored on the server.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

© UCLES 2020 9608/11/O/N/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 661

16

8 Joshua’s laptop is connected to the router on his home network.

(a) The laptop has a private IP address. The router has both public and private IP addresses.

Explain the reasons why Joshua’s laptop has a private IP address only, but the router has
both a private and a public IP address.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Joshua visits a website by entering its Uniform Resource Locator (URL).

Describe how the URL is converted into a matching IP address.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(c) Give one example of a valid IPv4 address.

...................................................................................................................................................

............................................................................................................................................. [1]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 9608/11/O/N/20


MUHAMMAD ALI KHAN
PAGE 662

Cambridge International AS & A Level

COMPUTER SCIENCE 9608/11


Paper 1 Written Paper October/November 2020
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2020 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.

This document consists of 10 printed pages.

© UCLES 2020 [Turn over


MUHAMMAD ALI KHAN
PAGE 663
9608/11 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2020 Page 2 of 10


MUHAMMAD ALI KHAN
PAGE 664
9608/11 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

1 1 mark for both compiler and interpreter linking to the sixth box (Converts a 3
high-level language program into a different form)
1 mark for the compiler having the other two correct links
1 mark for the interpreter having the other two correct links

Language translator Statements


Converts a low-level language
instruction into binary

Stops as soon as it finds a


syntax error

Needs the source code to be


Compiler present when the user's
program is run

Reports all errors found at the


Interpreter end of the process

Corrects syntax errors as they


are detected

Converts a high-level language


into a different form

Creates an executable file

© UCLES 2020 Page 3 of 10


MUHAMMAD ALI KHAN
PAGE 665
9608/11 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

2(a) 1 mark per bullet point to max 4 4


Max 3 if all generic, descriptions not related to benefits to the surgery
Max 3 for a list with no expansions

• Linked tables can be set up


• …the staff in the surgery can set up tables for the pets and their owners
and link them by common attributes

• To reduce / eliminate data redundancy


• …the staff in the surgery usually only needs to enter data once // in the
file system data is probably repeated unnecessarily in different files

• Improved data integrity


• … e.g. if they are searching for an owner’s pets then all results for the
owner should be returned

• Privacy is improved
• … e.g. different views can be given to different users in the surgery.
E.g. the receptionists cannot see the pet’s medical notes

• Referential integrity can be enforced // Unwanted or accidental deletion


of linked data is prevented
• … e.g. the staff in the surgery cannot accidently delete an owner’s
record while there are pets belonging to that owner // Staff cannot enter
an appointment for a pet that does not exist

• Program-data dependence is overcome


• …e.g. the staff in the surgery can add another attribute to the pet table
without affecting the data already stored or the queries already written

• More complex searches and queries can be executed … e.g. the staff in
the surgery can set up a query to only return the names of pets who
have not been seen for over a year

2(b)(i) 1 mark per bullet point to max 1 1

• OwnerFirstName, OwnerLastName and TelephoneNumber are


repeated for owners with more than one pet.

• OwnerFirstName, OwnerLastName and TelephoneNumber are


not dependent on the primary key of the PET table.

© UCLES 2020 Page 4 of 10


MUHAMMAD ALI KHAN
PAGE 666
9608/11 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

2(b)(ii) 1 mark per bullet point 4

• PET (PetID, PetName, PetBreed, PetDateOfBirth)

• OWNER (OwnerID, OwnerFirstName, OwnerLastName,


TelephoneNumber)

• A linking table between PET and OWNER

• Composite primary key made up of the primary keys of the other two
tables and no extra attributes in the linking table, for example,
PET_OWNER(PetID, OwnerID)

2(c)(i) Structured Query Language // SQL 1

2(c)(ii) 1 mark per bullet point 2

• ALTER TABLE APPOINTMENT

• ADD PRIMARY KEY(AppointmentID); //


ADD UNIQUE (AppointmentID);

2(c)(iii) 1 mark for each correct line 3

• SELECT Time, PetID


(FROM APPOINTMENT)
• WHERE StaffID = "JK1" AND Date = "02/02/2021"
• ORDER BY Time DESC;

2(d)(i) 1 mark for each bullet point to max 2 × 2 4

• Double entry // The data from the form is entered twice (by two different
people)
• and automatically compared

• Visual check // the data is compared (by two different people) after entry
• ... to the paper form manually

2(d)(ii) 1 mark per validation to max 2 2

For example:
• Time can have range check to make sure it is within the opening hours
of 09:00 and 16:50
• Date can have existence check to compare against list of dates they are
open

2(e)(i) 1 mark for each correctly completed term 4

The client-server model has one server that stores all the data for the
surgery. The other computers are clients. When a user requests data, a
request is sent to the server.

© UCLES 2020 Page 5 of 10


MUHAMMAD ALI KHAN
PAGE 667
9608/11 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

2(e)(ii) 1 mark per correct method to max 2 2

• Usernames and Passwords


• Biometrics // fingerprint recognition // iris scanner
• Two-step verification
• Token authentication // use of dongle // swipe cards

Question Answer Marks

3(a)(i) 1 mark per bullet point to max 2 2

Product:
For example:
• Ensure product is of a high standard
• Ensure product meets requirements
• Ensure the product is delivered within time
• Ensure the product is delivered within budget
• Ensure product development is well-documented
• Ensure product is tested thoroughly // free of bugs

3(a)(ii) 1 mark per bullet point to max 2 2

Colleagues:
For example:
• Need to be fair// do not show any prejudices
• To be supportive of colleagues
• Work together as a team
• Listen to each other’s ideas
• Assist colleagues in professional development
• Fully credit the work of other members of the team
• Make colleagues aware of expected standard ways of working

3(b) 1 mark for naming licence, 1 mark for description to max 2 per licence 4

• Commercial / proprietary...
• ...Software is sold for a fee therefore giving the client the income

• Shareware...
• ...Free for a trial period / limited features, and then users must pay for it

© UCLES 2020 Page 6 of 10


MUHAMMAD ALI KHAN
PAGE 668
9608/11 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

4(a) 1 mark for tick in correct position 1

Statement Tick (9)

Memory location 204 contains 400

Memory location 204 contains 41

Memory location 204 contains 231

Memory location 204 contains 29 9

4(b) 1 mark for tick in correct position 1

Statement Tick (9)

Memory location 120 contains 135

Memory location 120 contains 118 9

Memory location 120 contains 0

Memory location 120 contains 16

4(c) 1 mark for tick in correct position 1

Statement Tick (9)

Memory location 205 contains 607

Memory location 205 contains 601

Memory location 205 contains 603

Memory location 205 contains 606 9

4(d) 1 mark per correct mode 2

• Indexed
• Relative

© UCLES 2020 Page 7 of 10


MUHAMMAD ALI KHAN
PAGE 669
9608/11 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

4(e) 1 mark for correct ticks in pairs of rows (shaded) 3

Assembly Input and


Data Jump
language Arithmetic output of
movement instruction
instruction data

STO 120 9

JPE 200 9

ADD 3 9

LDD 20 9

INC ACC 9

OUT 9

Question Answer Marks

5(a)(i) 1 mark for real-time 3

1 mark per bullet point for justification to max 2

• It is being watched live


• It is not being downloaded to watch later // not already stored online

5(a)(ii) 1 mark per bullet point to max 3 3

• Insufficient bandwidth // slow internet connection


• … experiencing problems with buffering
• Video is too high quality to stream in real-time
• Congestion on the home network
• Too much demand for the video from the supplier
• Too many applications running on Oscar’s computer
• Oscar is trying to watch the video in High Definition, his friend is
watching the video at a lower resolution

5(b)(i) 1 mark per bullet point to max 2 2

• Each complete frame is transmitted/scanned each time


• All the pixels in frame 1 will be transmitted
• Then all the pixels in frame 2 will be transmitted

© UCLES 2020 Page 8 of 10


MUHAMMAD ALI KHAN
PAGE 670
9608/11 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

5(b)(ii) 1 mark per bullet point to max 3 3

• If a pixel in frame 2 has the same colour value as the pixel in the same
position in frame 1 then
• …it is not necessary to send the pixel again
• For example, the first row is / rows 1, 3, 5 and 6 on both frames are the
same // only rows 2 and 4 change
• … so does not need to be replicated // only rows 2 and 4 need to be
resent

5(b)(iii) Spatial redundancy 1

5(b)(iv) Multimedia container format 1

Question Answer Marks

6(a) 1111 0000 1011 1

6(b) 240 1

6(c) 175 1

6(d) 853 1

Question Answer Marks

7 1 mark per bullet point to max 4 4

• 98ௗkHz has a larger file size


• …because it is recording more samples per second
• …meaning more binary values being stored per second
• ...will take more time to download
• 98ௗkHz – Sound will be closer to the original
• …because the samples will be closer together
• …because of smaller quantization errors

© UCLES 2020 Page 9 of 10


MUHAMMAD ALI KHAN
PAGE 671
9608/11 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

8(a) 1 mark per bullet point to max 4 4

• The router needs a public IP address so it can be identified on the


Internet
• The router needs a private IP address so it can be identified on the
home network
• The router has a public and a private IP address so that it can route
data between the two networks (home and Internet)

• The laptop needs a private IP address so it can be identified on the


home network // so the router knows where to send data
• The laptop does not have a public IP address because it does not
connect directly to the Internet
• ... this is more secure because it hides the laptop from the outside world
• … all data from the Internet must be transmitted via the router

8(b) 1 mark per bullet point to max 3 3

• The browser parses the Uniform Resource Locator (URL) to obtain the
Domain Name

• The domain name is looked-up in the locally cached list of


corresponding IP addresses. If it is not found…
• The domain name is sent to the closest Domain Name Server (DNS)

• The DNS stores a table of Domain Names and corresponding IP


addresses // searches its database of Domain Names and
corresponding IP

• If the DNS finds the Domain Name, it returns the IP address


• If it cannot find the Domain Name, it sends the request to a higher DNS
/ upstream server
• If the Domain Name is not found, an error is returned

8(c) 1 mark for any valid example 1


e.g.
192.168.0.1

© UCLES 2020 Page 10 of 10


MUHAMMAD ALI KHAN
PAGE 672

Cambridge International AS & A Level


* 2 6 8 9 5 3 3 7 0 3 *

COMPUTER SCIENCE 9608/12


Paper 1 Theory Fundamentals October/November 2020
1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.

INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

DC (KN) 188577/1
© UCLES 2020 [Turn over
MUHAMMAD ALI KHAN
PAGE 673

1 Different types of data can be represented in a computer system.

(a) Numeric is one type of data.

(i) Convert the following denary number into Binary Coded Decimal (BCD).

105

..................................................................................................................................... [1]

(ii) Convert the following two’s complement binary integer into denary.

10111111

..................................................................................................................................... [1]

(iii) Convert the following hexadecimal number into denary.

AB

..................................................................................................................................... [1]

© UCLES 2020 9608/12/O/N/20


MUHAMMAD ALI KHAN
PAGE 674

(b) Character is another type of data.

The following tables show part of the ASCII code character set.

Character Denary value Character Denary value


A 65 a 97
B 66 b 98
C 67 c 99
D 68 d 100
E 69 e 101

(i) Describe how the computer uses ASCII codes to represent characters.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Convert the following string into ASCII codes.

Bed

...........................................................................................................................................

..................................................................................................................................... [1]

(iii) Give the denary ASCII code for the following character.

..................................................................................................................................... [1]

© UCLES 2020 9608/12/O/N/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 675

2 One method of compressing a file is run-length encoding (RLE).

(a) Describe, using an example, how a text file is compressed using RLE.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Explain why run-length encoding will sometimes increase the size of a text file.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

3 (a) Complete the following statements about CPU architecture by filling in the missing terms.

The Von Neumann model for a computer system uses the ....................................... program
concept.

A program is a series of instructions that are saved in ....................................... .

The processor ....................................... each instruction, ....................................... it and then

....................................... it.

The processor uses several ....................................... to store the data and instructions from

the program because they can be accessed faster than main memory.
[6]

© UCLES 2020 9608/12/O/N/20


MUHAMMAD ALI KHAN
PAGE 676

(b) The following table shows assembly language instructions for a processor that has one
general purpose register, the Accumulator (ACC).

Instruction
Explanation
Op code Operand
Direct addressing. Load the contents of the location at the given address to
LDD <address>
ACC.
LDM #n Immediate addressing. Load the denary number n to ACC.
Indirect addressing. The address to be used is at the given address. Load the
LDI <address>
contents of this second address to ACC.
STO <address> Store contents of ACC at the given address.

ADD <address> Add the contents of the given address to ACC.

CMP <address> Compare the contents of ACC with the contents of <address>.

OUT Output to screen the character whose ASCII value is stored in ACC.

INC <register> Add 1 to the contents of the register (ACC or IX).

JPE <address> Following a compare instruction, jump to <address> if the compare was True.
Following a compare instruction, jump to <address> if the compare was
JPN <address>
False.
END Return control to the operating system.

(i) The current contents of the


main memory are:

Address Instruction ASCII code table (Selected codes only)


50 LDD 80 ASCII Code Character
51 ADD 80 38 &
52 STO 80 39 ‘
53 LDD 82 40 (
54 INC ACC 41 )
55 STO 82 42 *
56 CMP 81
57 JPN 50
58 LDD 80
59 OUT
60 END

80 10
81 2
82 0

© UCLES 2020 9608/12/O/N/20


MUHAMMAD ALI KHAN
PAGE 677

Trace the program currently in memory using the following trace table.
The first instruction has been completed for you.

Instruction Memory address


ACC Output
address 80 81 82

10 2 0

50 10

[5]

© UCLES 2020 9608/12/O/N/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 678

(ii) Assembly language instructions can be put into groups.

Tick () one box in each column to identify the appropriate instruction group for each of
the three assembly language instructions.

Assembly language instruction


Instruction group
STO 80 JPN 50 INC ACC

Input and output of data

Data movement

Arithmetic operations

Unconditional and conditional jump instructions

Compare instructions

[3]

4 (a) Complete the truth table for the logic expression:

X = ((A NOR B) AND (C XOR A)) OR B

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

(b) Describe the difference between the operation of an AND gate and a NAND gate.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]
© UCLES 2020 9608/12/O/N/20
MUHAMMAD ALI KHAN
PAGE 679

5 A teacher uses a relational database, RESULTS, to store data about her students and their test
results.

(a) Describe the benefits to the teacher of using a relational database instead of a file-based
approach.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) The teacher sets up the RESULTS database using a Database Management System (DBMS).

(i) Explain the ways in which the developer interface of a DBMS will help the teacher set up
the database.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) The DBMS creates a data dictionary for the RESULTS database.

Identify three items that will be included in the data dictionary.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

© UCLES 2020 9608/12/O/N/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 680

10

(c) The RESULTS database has the following structure:

STUDENT(StudentID, FirstName, LastName, Class, TargetGrade)

TEST(TestID, Topic, MaxMarks)

STUDENT_TEST(StudentID, TestID, Mark)

(i) Complete the following table by giving one example of each database term from the
database RESULTS. Give both the field name and the corresponding table name.

Database term Field name Table name

Primary key

Foreign key

Attribute

[3]

(ii) Tick () one box to identify whether the database RESULTS is in 1NF, 2NF or 3NF.
Justify your choice.

1NF 2NF 3NF

Justification: ......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(iii) Complete the Data Manipulation Language (DML) script to display the Student ID, mark
and maximum marks for all tests with the topic of ‘Programming’.

SELECT StudentID, Mark, ........................................................

FROM STUDENT_TEST, ........................................................

........................................................ Topic = "Programming"

AND ........................................................ = ........................................................;


[5]

© UCLES 2020 9608/12/O/N/20


MUHAMMAD ALI KHAN
PAGE 681

11

(iv) The teacher wants to implement validation to make sure that all data entered into the
database RESULTS are reasonable.
Name three different methods of data validation that can be used in the RESULTS
database. Describe how each method will limit the data that can be entered in this
database.

Method 1 ...........................................................................................................................

Description ........................................................................................................................

...........................................................................................................................................

Method 2 ...........................................................................................................................

Description ........................................................................................................................

...........................................................................................................................................

Method 3 ...........................................................................................................................

Description ........................................................................................................................

...........................................................................................................................................
[6]

(d) The teacher stores the database on the desktop computer in her classroom.

(i) Explain why it is important to keep the database secure.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Explain the ways in which the teacher can use data backup and disk mirroring to limit the
amount of data lost in the event of hardware failure.

Data backup

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Disk mirroring

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]
© UCLES 2020 9608/12/O/N/20 [Turn over
MUHAMMAD ALI KHAN
PAGE 682

12

6 Malika has started a new job as a trainee software engineer.

(a) Malika’s manager has asked her to work with a senior software engineer for the first week.

Explain the ways in which Malika’s manager has acted ethically.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Malika researched the company and the programming languages used by the company
before she started the job.

Explain the ways in which Malika has acted ethically.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) Malika thinks that her colleagues do not like her, so she asks her manager for help.

Describe the actions the manager could take to support Malika in an ethical way.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2020 9608/12/O/N/20


MUHAMMAD ALI KHAN
PAGE 683

13

7 A web server has a public IPv4 address.

(a) Draw lines to link each characteristic to its appropriate IP address.

Characteristic IP address

Can use hexadecimal notation

Each group of digits is a number


between 0 and 65535
IPv4

Consists of four groups of digits

IPv6

Uses double colons (::)

The total length of the address is 32 bits

[2]

(b) IP addresses can be static or dynamic.

Explain the reasons for the web server using a static instead of a dynamic IP address.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2020 9608/12/O/N/20


MUHAMMAD ALI KHAN
PAGE 684

Cambridge International AS & A Level

COMPUTER SCIENCE 9608/12


Paper 1 Written Paper October/November 2020
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2020 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.

This document consists of 11 printed pages.

© UCLES 2020 [Turn over


MUHAMMAD ALI KHAN
PAGE 685
9608/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2020 Page 2 of 11


MUHAMMAD ALI KHAN
PAGE 686
9608/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

1(a)(i) 0001 0000 0101 1

1(a)(ii) – 65 1

1(a)(iii) 171 1

1(b)(i) 1 mark per bullet point to max 2 2

• Each character has a unique character code


• The binary value for each character in the string is stored in sequence
• ASCII codes may be 7 or 8 bits long

1(b)(ii) 66 101 100 1

1(b)(iii) 72 1

Question Answer Marks

2(a) 1 mark per bullet point to max 2 for description 3

• Instead of storing each repeated sequence of characters individually


• … the character is stored and the number of consecutive occurrences

1 mark for using relevant example


e.g.
• instead of storing aaaa , store a4

2(b) 1 mark per bullet point to max 2 2

• Repeated sequences of characters rarely occur in text files // Most


characters are used only once in any sequence
• The character code and the fact that it is stored once will both be stored,
which will use as much if not more space

© UCLES 2020 Page 3 of 11


MUHAMMAD ALI KHAN
PAGE 687
9608/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

3(a) 1 mark for each correct term 6

Stored
Memory
Fetches
Decodes
Executes
Registers

The Von Neumann model uses the stored program concept.

The program is a series of instructions that are saved in memory.

The processor fetches each instruction, decodes it and then executes it.

The processor uses several registers to store the data and instructions from
the program because they can be accessed faster than main memory.

© UCLES 2020 Page 4 of 11


MUHAMMAD ALI KHAN
PAGE 688
9608/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

3(b)(i) 1 mark for each set of shaded rows 5

Instruction Memory address


ACC Output
address 80 81 82
10 2 0
50 10
51 20
52 20
53 0
54 1
55 1
56
57
50 20
51 40
52 40
53 1
54 2
55 2
56
57
58 40
59 (
60

© UCLES 2020 Page 5 of 11


MUHAMMAD ALI KHAN
PAGE 689
9608/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

3(b)(ii) 1 mark for each correct column. 3

Assembly language instruction


Instruction Group
STO 80 JPN 50 INC ACC

Input and output of data

Data movement 9

Arithmetic operations 9

Unconditional and conditional jump


9
instructions

Compare instructions

Question Answer Marks

4(a) 1 mark for each pair of answers 4

A B C Working space X

0 0 0 0

0 0 1 1

0 1 0 1

0 1 1 1

1 0 0 0

1 0 1 0

1 1 0 1

1 1 1 1

4(b) 1 mark per bullet point to max 2 2

• AND is 1 only if both inputs are 1


• NAND is 0 only if both inputs are 1 // NAND is 1 whenever both inputs
are not 1

© UCLES 2020 Page 6 of 11


MUHAMMAD ALI KHAN
PAGE 690
9608/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

5(a) 1 mark per bullet point to max 4 4


Max 3 if all generic, descriptions not related to benefits to the teacher.
Max 3 for a list with no expansions

• Linked tables can be set up


• … the teacher can set up tables for her students and their results and link
them by common attributes

• Reduced data redundancy


• … the teacher usually only needs to enter data once

• Improved data integrity


• … e.g. if they are searching for a student’s marks then all results for the
student should be returned

• Program-data dependence is overcome


• … e.g. the teacher can add the results for additional tests without
affecting the data already stored

• Privacy is improved
• … e.g. the teacher can prevent student access to the data (using views
etc.)

• Referential integrity can be enforced // Unwanted or accidental deletion of


linked data is prevented
• … e.g. A teacher cannot enter a mark for a student that does not exist //
the teacher cannot accidently delete a student’s record while there are
test results for that student

• More complex searches and queries can be executed


• … e.g. the teacher can set up a query to only return the test results for
students who achieve below a certain mark

5(b)(i) 1 mark per bullet point to max 2 2

The teacher can ...


• Set up forms for the input of student data
• Add objects to a form to make data input easier, e.g. drop-down boxes
• Design a report for the output of student marks
• Add a menu to select options for different actions

5(b)(ii) 1 mark for each correct item to max 3 3

For example:
• Table / entity names
• Field / attribute names
• Data types
• Validation
• Primary Keys

© UCLES 2020 Page 7 of 11


MUHAMMAD ALI KHAN
PAGE 691
9608/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

5(c)(i) 1 mark for each correct example 3

Database term Field name Table name

StudentID // TestID STUDENT // TEST //


Primary key // StudentID and STUDENT_TEST
TestID

Foreign key StudentID // TestID STUDENT_TEST

Attribute Any field from that table Any table

5(c)(ii) 1 mark for tick in correct box 3


• It is in 3NF

1 mark per bullet point to max 2 for justification:


• (It is in 1NF), there are no repeating groups of attributes // all attributes
are atomic

• (It is in 2NF), there are no partial dependencies

• All fields are fully dependant on the PK // No transitive dependencies

5(c)(iii) 1 mark for each correct answer 5

SELECT StudentID, Mark, MaxMarks / TEST.MaxMarks


FROM STUDENT_TEST, TEST
WHERE / WHERE Test.Topic = "Programming"
AND TEST.TestID = STUDENT_TEST.TestID ;

© UCLES 2020 Page 8 of 11


MUHAMMAD ALI KHAN
PAGE 692
9608/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

5(c)(iv) 1 mark for correct name and 1 mark for corresponding description applied to 6
RESULTS database. Max 2 per rule to max 3 rules

The descriptions are examples only, there are many correct answers

• Length check
• Limit the target grade to 1 character

• Range check
• The mark for each test must be between 0 and MaxMarks

• Existence check
• The test topic must be in a pre-existing list

• Presence check
• A mark must be entered / not null

• Format check
• The data for a class must be one digit followed by one letter, e.g.3A

• Type check
• The maximum marks for a test must be an integer

5(d)(i) 1 mark per bullet point to max 2 2

• Stop unauthorised access // limit access to personal data about students


• Prevent loss of data // avoid students’ test mark being deleted.
• Prevent unauthorised changes to data // prevent students changing
grades

5(d)(ii) 1 mark per bullet point to max 3 for each, max 4 in total 4

Backup
• A copy of the RESULTS database is made
• ... at regular intervals // Sensible frequency of backups, e.g. daily, weekly
etc.
• ... and stored in a different location
• So, in the event of data loss, (most of) the original data may be
recovered.

Disk mirroring
• Data is written to different disks simultaneously
• So, in the event of hardware failure, a second identical copy is
immediately available.

© UCLES 2020 Page 9 of 11


MUHAMMAD ALI KHAN
PAGE 693
9608/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

6(a) 1 mark per bullet point to max 2 2

For example:
• The manager is supporting her professional development
• The manager is working in the best interest of his/her colleague (Malika)
• This will ensure she is introduced to all aspects of the job
• The manager is offering appropriate support

6(b) 1 mark per bullet point to max 2 2

For example:
• She is acting in her own best interest
• … by taking responsibility for her own professional development
• She is acting in the best interests of her colleagues
• … by ensuring she is up-to-date and does not need further training

6(c) 1 mark per bullet point to max 2 2

For example:
• Discuss the problems with her
• Discuss the concerns with her colleagues
• Assign her a mentor who can reassure her
• Team building exercises

7(a) 1 mark for correct lines from IPv4, 1 mark for correct lines from IPv6 2

Characteristic IP address
Can use hexadecimal
notation

Each group of digits is a


number between 0 and
65535 IPv4

Consists of four groups of


digits

IPv6
Uses double colons (::)

The total length of the


address is 32 bits

© UCLES 2020 Page 10 of 11


MUHAMMAD ALI KHAN
PAGE 694
9608/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

7(b) 1 mark per bullet point to max 3 3

• Static IP does not change whereas a dynamic IP address does change


• … the DNS does not need updating
• … which might be delayed causing ‘address not found’ errors
• The webserver may be accessed directly using just the IP address // the
IP address is still held in cache memory

© UCLES 2020 Page 11 of 11


MUHAMMAD ALI KHAN
PAGE 695

Cambridge International AS & A Level


* 1 0 7 9 3 9 2 7 5 2 *

COMPUTER SCIENCE 9608/13


Paper 1 Theory Fundamentals October/November 2020
1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.

INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Blank pages are indicated.

DC (JC/CT) 188578/2
© UCLES 2020 [Turn over
MUHAMMAD ALI KHAN
PAGE 696

1 Identify the most appropriate utility program to use for each of the following tasks.

Task Utility program

Rearrange the data on a disk so that files are


contiguous, and all free space is collected together

Prepare a disk for initial use

Reduce the size of a file

Examine a disk to find any bad sectors

[4]

2 Four terms about videos are given with six descriptions.

Draw one line from each term relating to videos to its correct description.

Term Description

The number of images that are displayed per second

The number of pixels per unit of measurement


Progressive encoding
e.g. per inch

Each frame is split into two fields: the first field


contains only the odd lines, the second field contains
Frame rate the even lines

Only the pixels that have changed are transmitted

Interlaced encoding

The complete frame is reproduced in each scan of


the image

Image resolution

The number of pixels in the image

[4]
© UCLES 2020 9608/13/O/N/20
MUHAMMAD ALI KHAN
PAGE 697

3 Hannah is writing a computer program using a high-level language. She uses both a compiler and
an interpreter.

(a) Describe the ways in which Hannah will use an interpreter while writing the program.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Explain the reasons why Hannah uses a compiler when she has finished writing the program.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) Some high-level languages are partially compiled and partially interpreted.

Give one benefit and one drawback of using a language that is partially compiled and partially
interpreted.

Benefit ......................................................................................................................................

...................................................................................................................................................

Drawback ..................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2020 9608/13/O/N/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 698

4 A laptop on a home network connects to the Internet through a router.

(a) The laptop has an IP address.

(i) Give the reasons why the laptop has an IP address.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) The laptop’s IP address is private.

Give the reasons why the laptop does not have a public IP address.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) The router has an IPv4 address.

Give three differences between the format of an IPv4 address and an IPv6 address.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2020 9608/13/O/N/20


MUHAMMAD ALI KHAN
PAGE 699

(b) A Public Switched Telephone Network (PSTN) is one example of a communication system
that can be used to support the Internet.

Identify and describe two other communication systems that can be used to support the
Internet.

System 1 ...................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

System 2 ...................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2020 9608/13/O/N/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 700

(c) A web page contains PHP code.

(i) Complete the following table by writing a description of the function of each line of PHP
code.

PHP code Description

echo "Hello World";

$number1 = 22;

$newValue = $_GET["number"];

print "Hello " . $name . "<br>";

[4]

(ii) PHP is a server-side scripting language.

Give an example of a client-side scripting language.

...........................................................................................................................................

..................................................................................................................................... [1]

(d) The laptop includes a parity bit in each byte it transmits.

Explain how parity checks protect the integrity of the data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2020 9608/13/O/N/20


MUHAMMAD ALI KHAN
PAGE 701

5 The fetch-execute cycle is used when a computer processor runs a program.

(a) (i) Complete the table by writing the register transfer notation for each of the descriptions.

Letter Description Register transfer notation


The Memory Address Register (MAR) stores an
A address. The contents of this stored address are
copied to the Memory Data Register (MDR).

The contents of the Program Counter (PC) are


B
copied to the Memory Address Register (MAR).

The contents of the Memory Data Register (MDR)


C
are copied to the Current Instruction Register (CIR).

The contents of the Program Counter (PC) are


D
incremented.

[4]

(ii) Write one of the letters A, B, C or D (from the table above) on each row (1 to 4), to show
the correct order of the fetch-execute cycle.

1 ................................

2 ................................

3 ................................

4 ................................
[2]

(b) Buses are used to transfer data between various components of the computer system.

Tick () one or more boxes on each row to identify the bus(es) each statement describes.

Statement Address bus Control bus Data bus


Receives data from the MAR
Carries an address or an instruction or a
value
Transmits timing signals to components
Bidirectional
[2]

© UCLES 2020 9608/13/O/N/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 702

(c) The following table shows assembly language instructions for a processor that has one
general purpose register, the Accumulator (ACC).

Instruction
Explanation
Op code Operand
INV Input a denary value from the keyboard and store it in ACC.
LDD <address> Direct addressing. Load the contents of the location at the given address to ACC.
LDM #n Immediate addressing. Load the denary number n to ACC.
Indirect addressing. The address to be used is at the given address. Load the
LDI <address>
contents of this second address to ACC.
ADD <address> Add the contents of the given address to ACC.
OUT Output to screen the character whose ASCII value is stored in ACC.
INC <register> Add 1 to the contents of the register (ACC or IX).
CMP <address> Compare the contents of ACC with the contents of <address>.
JPE <address> Following a compare instruction, jump to <address> if the compare was True.
JPN <address> Following a compare instruction, jump to <address> if the compare was False.
STO <address> Store contents of ACC at the given address.
END Return control to the operating system.

(i) The assembly language instructions are grouped according to their function.

Write one example of an op code from the table of instructions for each of the following
groups.

Arithmetic ............................................................

Data movement ............................................................


[2]

(ii) The current contents of the main memory are:

Address Instruction
500 INV
501 STO 901
502 INV
503 STO 900
504 ADD 902
505 STO 902
506 LDD 903
507 INC ACC
508 STO 903
509 CMP 901
510 JPN 502
511 END

900
901
902 0
903 0
© UCLES 2020 9608/13/O/N/20
MUHAMMAD ALI KHAN
PAGE 703

Trace the program currently in memory using the following trace table when the values
2, 10 and 3 are input.

The first instruction has been completed for you.

Memory address
Instruction
ACC
address
900 901 902 903

0 0

500 2

[6]
© UCLES 2020 9608/13/O/N/20 [Turn over
MUHAMMAD ALI KHAN
PAGE 704

10

(d) The current contents of a general-purpose register X are:

X 1 1 0 0 1 0 1 0

(i) The contents of X represent an unsigned binary integer.

Convert the contents of X into denary.

..................................................................................................................................... [1]

(ii) The contents of X represent a two’s complement binary integer.

Convert the contents of X into denary.

..................................................................................................................................... [1]

(iii) State why the binary number in X cannot represent a Binary Coded Decimal (BCD).

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2020 9608/13/O/N/20


MUHAMMAD ALI KHAN
PAGE 705

11

6 Lara is managing a team of software developers who are writing a computer program.

(a) Benedict is one of the developers. He is struggling to keep up with his workload.

Describe the ways in which Lara can ethically support Benedict.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Lara has identified that when a specific sequence of actions is performed in the program, a
run-time error causes the program to crash.

She has decided there is not enough time to debug the code because the client needs the
system urgently, and there is a possibility that the client may never perform this sequence of
actions.

Explain the reasons why Lara is not acting ethically.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) The client wants to copyright the final program so that no one else can copy or amend it.

(i) State the purpose of copyrighting the computer program.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Identify two software licences that would be appropriate for the program.

Licence 1 ...........................................................................................................................

Licence 2 ...........................................................................................................................
[2]

(iii) Identify one software licence that would not be appropriate for the program. Justify your
choice.

Software licence ................................................................................................................

Justification .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[2]
© UCLES 2020 9608/13/O/N/20 [Turn over
MUHAMMAD ALI KHAN
PAGE 706

12

7 Wilbur uses vector graphics to create a logo for his company.

Wilbur Designs

(a) Describe how the logo is represented and encoded by the computer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Wilbur scans a hand drawn image. The scanned image uses 8 bits to store the colour for
each pixel. The image is 2048 pixels wide by 1024 pixels high.

(i) Calculate an estimate of the file size of the scanned image. Give your answer rounded to
the nearest MB.

Show your working.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Answer ................................. MB
[2]

© UCLES 2020 9608/13/O/N/20


MUHAMMAD ALI KHAN
PAGE 707

13

(ii) Wilbur wants to compress the scanned image before emailing it to his colleague.

Describe one lossy compression technique that Wilbur can use to compress this image.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

© UCLES 2020 9608/13/O/N/20 [Turn over


MUHAMMAD ALI KHAN
PAGE 708

14

8 Consider the following logic circuit.

B X

(a) Complete the truth table for the logic circuit.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1

[4]

(b) Identify one logic gate not used in the logic circuit shown. Complete the truth table for this
logic gate with the inputs A and B.

Logic gate .................................................................................................................................

A B Output
0 0
0 1
1 0
1 1
[2]
© UCLES 2020 9608/13/O/N/20
MUHAMMAD ALI KHAN
PAGE 709

Cambridge International AS & A Level

COMPUTER SCIENCE 9608/13


Paper 1 Written Paper October/November 2020
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2020 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.

This document consists of 10 printed pages.

© UCLES 2020 [Turn over


MUHAMMAD ALI KHAN
PAGE 710
9608/13 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2020 Page 2 of 10


MUHAMMAD ALI KHAN
PAGE 711
9608/13 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

1 1 mark for each correct utility program 4

Task Utility program

Rearrange the data on a disk so that files are


contiguous, and all free space is collected Disk defragmenter
together

Prepare a disk for initial use Disk formatter

Reduce the size of a file File compression

Disk contents analysis


Examine the disk to find any bad sectors
/ repair

Question Answer Marks

2 1 mark for each correct line 4

The number of images that are


displayed per second

Progressive The number of pixels per unit of


encoding measurement e.g. per inch

Each frame is split into two fields,


Frame rate the first field contains only the odd
lines, the second field contains the
even lines

Interlaced Only the pixels that have changed


encoding are transmitted

Image The complete frame is reproduced


resolution in each scan of the image

The number of pixels in the image

Question Answer Marks

3(a) 1 mark per bullet point to max 2 2

• To run / test the incomplete program


• To locate individual errors in the program because the interpreter stops
• … and allows the programmer to correct errors in real-time
• To change the program and see the effects of the changes in real-time

© UCLES 2020 Page 3 of 10


MUHAMMAD ALI KHAN
PAGE 712
9608/13 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

3(b) 1 mark per bullet point to max 2 2

• To run / test the program multiple times without re-compiling


• To produce an executable file
• … so that it can be distributed without the source code

3(c) 1 mark for a benefit, 1 mark for a drawback 2

Benefit:
• Programs may be interpreted on different platforms

Drawback:
• Intermediate code / program still needs to be interpreted on the user’s
computer, which may run slowly
• Extra CPU resources may be required

Question Answer Marks

4(a)(i) 1 mark per bullet point 2

• To identify the laptop on the home network


• To allow the router to send data to the laptop from the Internet / another
device on the home network

4(a)(ii) 1 mark per bullet point to max 2 2

• The router has the public IP address for the home network
• All data comes through the router
• The laptop is not accessible / visible to the outside world
• … to ensure security // to protect the laptop from external threats

4(a)(iii) 1 mark per bullet point to max 3 3

• IPv4 has 4 groups of digits, IPv6 has 8 groups of digits


• In IPv4 each group is from 0-255, in IPv6 each group is from 0-65535
• IPv4 uses a full-stop between each group, IPv6 uses a colon between
each group
• IPv4 is 32-bit, IPv6 is 128-bit // IPv4 uses 4 bytes, IPv6 uses 16 bytes

4(b) 1 mark for identification, 1 mark for further description 4

• Dedicated lines / leased line services


• Connection that is only used for that business/organisation // permanent
connection

• Cell phone network


• Send data to cell towers over mobile connection

• Satellite
• Send data to satellites in orbit

© UCLES 2020 Page 4 of 10


MUHAMMAD ALI KHAN
PAGE 713
9608/13 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

4(c)(i) 1 mark for each correct description 4

PHP Code Description

echo "Hello World"; Outputs the string Hello


World to the browser

$number1 = 22; Stores the number 22 in the


variable $number1

Get the value assigned to


$newValue = $ _ GET["number"]; number and store it in the
variable $newValue

Output Hello, followed by the


print "Hello " . $name . "<br>"; value stored in the variable
$name and then force a new
line break

4(c)(ii) 1 mark for a correct answer 1

• Javascript

4(d) 1 mark per bullet point to max 2 2

• Automatically checks for errors on receipt of data


• Alerts if data has been received incorrectly // requests data to be re-sent
• Provides a verification check on data

© UCLES 2020 Page 5 of 10


MUHAMMAD ALI KHAN
PAGE 714
9608/13 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

5(a)(i) 1 mark for each correct row 4

Letter Action Register transfer notation

The Memory Address Register


(MAR) stores an address. The
A contents of this stored address are MDR ← [[MAR]]
copied to the Memory Data Register
(MDR).

The contents of the Program


B Counter (PC) are copied to the MAR ← [PC]
Memory Address Register (MAR).

The contents of the Memory Data


C Register (MDR) are copied to the CIR ← [MDR]
Current Instruction Register (CIR).

The contents of the Program


D PC ← [PC] + 1
Counter (PC) are incremented.

5(a)(ii) 1 mark for B, A, C in order 2

1 mark for D at any point after B

5(b) 1 mark for the first three rows correct 1 mark for the last row correct 2

Address Control Data


Statement
bus bus bus

Receives data from the MAR 9

Carries an address or an instruction or a 9


value

Transmits timing signals to components 9

Bidirectional 9 9

© UCLES 2020 Page 6 of 10


MUHAMMAD ALI KHAN
PAGE 715
9608/13 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

5(c)(i) 1 mark for each correct example, ignore operand 2

Arithmetic:
• ADD // INC

Data movement
• STO // LDD // LDI // LDM

5(c)(ii) 1 mark for each correct shaded section 6

Instruction Memory address


address ACC 900 901 902 903
0 0
500 2
501 2
502 10
503 10
504 10
505 10
506 0
507 1
508 1
509
510
502 3
503 3
504 13
505 13
506 1
507 2
508 2
509
511

5(d)(i) 202 1

5(d)(ii) –54 1

5(d)(iii) Both nibbles are binary numbers representing denary numbers greater than 9 1

© UCLES 2020 Page 7 of 10


MUHAMMAD ALI KHAN
PAGE 716
9608/13 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

6(a) 1 mark for each valid point or appropriate expansion to max 2 2

e.g.
• Reduce his workload // Review his work demands
• Redistribute his work
• Arrange a meeting with him
• ... to discuss the reasons why he is struggling

6(b) 1 mark for each valid point or appropriate expansion to max 2 2

e.g.
• Not acting in best interest of the client
• ... The error could cause significant problems for the client if encountered
• The product does not meet the highest possible standard
• Not acting in the best interest of the development company
• … if the error occurs, it could lead to repercussions for the development
company

6(c)(i) 1 mark from 1

• Protects the intellectual property


• Allows legal action against anyone else who claims it as their own
• Formally / Legally identify the client as the owner of the software

6(c)(ii) 1 mark for each correct licence 2

• Commercial
• Shareware

6(c)(iii) 1 mark for correctly identifying a licence, 1 mark for justification 2

• Open Source // Free Software


• Anyone can modify/copy the source code and re-distribute which is not
what the client wants

Question Answer Marks

7(a) 1 mark per bullet point to max 4 4

• Each item is a drawing object


• Properties of each drawing object are stored
• … an example of a property e.g. the position/coordinates of each drawing
object
• … a second example of a property e.g. the line colour
• Exact dimensions are not stored // a calculation for proportional size is
stored
• Objects are created using mathematical calculations

© UCLES 2020 Page 8 of 10


MUHAMMAD ALI KHAN
PAGE 717
9608/13 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

7(b)(i) 1 mark for working 2


1 mark for correct answer

Working:
1024 × 2048 = 2ௗ097ௗ152 pixels
= 2ௗ097ௗ152 bytes (8 bits per pixel)
= 2ௗ097ௗ152 / 1024 = 2048 KB
= 2048 / 1024 MB

Answer: 2 MB

7(b)(ii) 1 mark for identification of method, max 2 for description for one method 3

e.g.
• Reduce the colour depth
• … reduce the number of bits per colour
• … each pixel has fewer bits

• Reducing the resolution


• … fewer pixels per unit measurement
• … fewer pixels / binary numbers are stored

8(a) 1 mark for each pair of correct answers (shaded) 4

A B C Working space X

0 0 0 1

0 0 1 0

0 1 0 1

0 1 1 1

1 0 0 0

1 0 1 0

1 1 0 1

1 1 1 0

© UCLES 2020 Page 9 of 10


MUHAMMAD ALI KHAN
PAGE 718
9608/13 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

8(b) 1 mark for correct name, 1 mark for corresponding truth table 2

• NAND
A B Output

0 0 1

0 1 1

1 0 1

1 1 0

• XOR
A B Output

0 0 0

0 1 1

1 0 1

1 1 0

© UCLES 2020 Page 10 of 10


MUHAMMAD ALI KHAN
PAGE 719

Cambridge International AS & A Level


* 2 2 1 1 3 9 3 4 1 4 *

COMPUTER SCIENCE 9618/11


Paper 1 Theory Fundamentals May/June 2021
1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.

INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages.

DC (PQ) 214537
© UCLES 2021 [Turn over
MUHAMMAD ALI KHAN
PAGE 720

1 Anya scans an image into her computer for a school project.

(a) The scanned image is a bitmapped image.

(i) Complete the following table to describe the two terms about graphics.

Term Description

...........................................................................................................................
Pixel ...........................................................................................................................

...........................................................................................................................

...........................................................................................................................
File header ...........................................................................................................................

...........................................................................................................................

[2]

(ii) The image is scanned with an image resolution of 1024 ) 512 pixels, and a colour depth
of 8 bits per pixel.

Calculate an estimate for the file size, giving your answer in mebibytes. Show your
working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Answer .......................................... mebibytes


[3]

(b) The image is compressed using lossless compression.

Identify one method of lossless compression that can be used to compress the image and
describe how the method will reduce the file size.

Lossless compression method .................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]
© UCLES 2021 9618/11/M/J/21
MUHAMMAD ALI KHAN
PAGE 721

(c) One of the colours used in the image has the hexadecimal colour code:

#FC238A

FC is the amount of red, 23 is the amount of green and 8A is the amount of blue in the colour.

(i) Convert the hexadecimal code FC into denary.

..................................................................................................................................... [1]

(ii) The amount of green in binary is 00100011. This has the denary number 15 added to it
to create a second colour.

Add the denary number 15 to the binary number 00100011 and give your answer in
binary.

Perform the addition in binary. Show your working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Answer (in binary) ........................................


[3]

(iii) Hexadecimal 23 in two’s complement representation is 00100011. The denary number


10 needs to be subtracted from this value.

Subtract the denary number 10 from the two’s complement representation 00100011.

Give your answer in binary. Show your working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Answer (in binary) ........................................


[3]

© UCLES 2021 9618/11/M/J/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 722

(d) Anya made sure that the image was not subject to any copyright before scanning it.

Describe what is meant by copyright.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2021 9618/11/M/J/21


MUHAMMAD ALI KHAN
PAGE 723

2 Bingwen’s computer comes with an Operating System and utility software.

(a) Draw one line from each utility software to its correct description.

Utility software Description

Scans software for errors and repairs the


problems

Moves parts of files so that each file is


Disk formatter
contiguous in memory

Defragmentation Creates a copy of data that is no longer


required

Back-up Sets up a disk so it is ready to store files

Disk repair Scans for errors in a disk and corrects them

Creates a copy of data in case the original is


lost

[4]

(b) Identify four key management tasks that the Operating System will perform.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................

4 ................................................................................................................................................
[4]

© UCLES 2021 9618/11/M/J/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 724

3 A processor has one general purpose register, the Accumulator (ACC), and several special
purpose registers.

(a) Complete the following description of the role of the registers in the fetch-execute cycle by
writing the missing registers.

The ........................................................................ holds the address of the next instruction

to be loaded. This address is sent to the ........................................................................ .

The ............................................................................ holds the data fetched from this address.

This data is sent to the ............................................................................ and the Control Unit

decodes the instruction’s opcode.

The ............................................................................ is incremented.


[5]

© UCLES 2021 9618/11/M/J/21


MUHAMMAD ALI KHAN
PAGE 725

(b) The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).

Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
LDD <address> Direct addressing. Load the contents of the location at the given address to ACC
Indirect addressing: The address to be used is at the given address. Load the
LDI <address>
contents of this second address to ACC
Indexed addressing. Form the address from <address> + the contents of the
LDX <address>
Index Register. Copy the contents of this calculated address to ACC
LDR #n Immediate addressing. Load the number n to IX
MOV <register> Move the contents of the accumulator to the given register (IX)
STO <address> Store contents of ACC at the given address
ADD <address> Add the contents of the given address to the ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP <address> Compare the contents of ACC with the contents of <address>
JPE <address> Following a compare instruction, jump to <address> if the compare was True
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
OUT Output to the screen the character whose ASCII value is stored in ACC
END Return control to the operating system
Bits in ACC are shifted logically n places to the left. Zeros are introduced on
LSL #n
the right hand end
Bits in ACC are shifted logically n places to the right. Zeros are introduced on
LSR #n
the left hand end
<address> can be an absolute address or a symbolic address
# denotes a denary number, e.g. #123

© UCLES 2021 9618/11/M/J/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 726

The current contents of the main memory and selected values from the ASCII character set
are shown.

Address Instruction ASCII code table (selected codes only)


200 LDD 365 ASCII code Character
201 CMP 366 65 A
202 JPE 209 66 B
203 INC ACC 67 C
204 STO 365 68 D
205 MOV IX
206 LDX 365
207 OUT
208 JMP 200
209 END

365 1
366 3
367 65
368 66
IX 0

© UCLES 2021 9618/11/M/J/21


MUHAMMAD ALI KHAN
PAGE 727

Complete the trace table for the program currently in main memory.

Instruction Memory address


ACC IX Output
address 365 366 367 368

1 3 65 66 0

[6]

© UCLES 2021 9618/11/M/J/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 728

10

(c) (i) The Accumulator currently contains the binary number:

0 0 1 1 0 1 0 1

Write the contents of the Accumulator after the processor has executed the following
instruction:

LSL #2

[1]

(ii) The Accumulator currently contains the binary number:

0 0 1 1 0 1 0 1

Identify the mathematical operation that the following instruction will perform on the
contents of the accumulator.

LSR #3
...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2021 9618/11/M/J/21


MUHAMMAD ALI KHAN
PAGE 729

11

4 Melinda and her friends set up a peer-to-peer network between their computers to share data.

(a) Describe the key features of a peer-to-peer network.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Describe two drawbacks to Melinda and her friends of using a peer-to-peer network.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(c) Melinda connects her laptop to the internet through her router.

(i) Tick () one box in each row to identify whether the task is performed by the router or
not.

Performed by Not performed


Task
router by router
Receives packets from devices
Finds the IP address of a Uniform Resource Locator (URL)
Directs each packet to all devices attached to it
Stores the IP and/or MAC address of all devices attached to it
[2]

© UCLES 2021 9618/11/M/J/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 730

12

(ii) Melinda mainly uses the internet to watch films and play computer games.

Tick () one box to identify whether Melinda should connect to the router using a wired
or wireless network and justify your choice.

Wired
Wireless

Justification .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(d) Melinda sends emails from her webmail account (email account accessed through a website).

Explain whether Melinda is using the internet, or the World Wide Web (WWW), or both.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2021 9618/11/M/J/21


MUHAMMAD ALI KHAN
PAGE 731

13

5 Kiara has a washing machine and a refrigerator.

(a) She has an embedded system in her washing machine.

Describe what is meant by an embedded system, using the washing machine as an example.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) The washing machine’s embedded system makes use of both Random Access Memory
(RAM) and Read Only Memory (ROM).

State the purpose of RAM and ROM within the washing machine’s embedded system.

RAM ..........................................................................................................................................

...................................................................................................................................................

ROM .........................................................................................................................................

...................................................................................................................................................
[2]

(c) The temperature in her refrigerator must be kept between 4 and 6 degrees Celsius.

The microprocessor in the refrigerator turns on the cooling if the temperature is too high, and
turns off the cooling if the temperature is too low.

Explain why the system in the refrigerator is a control and not a monitoring system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2021 9618/11/M/J/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 732

14

6 Each of the following algorithms performs data validation.

State the type of validation check that each of the algorithms performs.

(a)

INPUT x

IF x < 0 OR x > 10 THEN

OUTPUT "Invalid"

ENDIF

.................................................................................................................................................... [1]

(b)

INPUT x

IF x = "" THEN

OUTPUT "Invalid"

ENDIF

.................................................................................................................................................... [1]

(c)

INPUT x

IF NOT(x = "Red" OR x = "Yellow" OR x = "Blue") THEN

OUTPUT "Invalid"

ENDIF

.................................................................................................................................................... [1]

© UCLES 2021 9618/11/M/J/21


MUHAMMAD ALI KHAN
PAGE 733

15

7 Bobby and Kim are discussing databases.

(a) Bobby tells Kim that a file-based approach is usually better than a relational database.

Explain why Bobby is incorrect.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Bobby has a shop that sells products to customers. His database will store data about his
customers, their payment details, orders and the products he sells. Customers will have login
details to access their accounts. The database will update customers’ payment and login
details without keeping any historical records.

(i) Give one example of each of the following relationships from Bobby’s database.

one-to-one

...........................................................................................................................................

...........................................................................................................................................

one-to-many

...........................................................................................................................................

...........................................................................................................................................

many-to-many

...........................................................................................................................................

...........................................................................................................................................
[3]

(ii) Tick () one box to identify the relationship that cannot be directly implemented in a
normalised relational database.

Relationship Tick ()

one-to-one

one-to-many

many-to-many
[1]
© UCLES 2021 9618/11/M/J/21 [Turn over
MUHAMMAD ALI KHAN
PAGE 734

16

(iii) Bobby wants to name his database SHOPORDERS.

Write a Data Definition Language (DDL) statement to define a new database with the
name SHOPORDERS.

...........................................................................................................................................

..................................................................................................................................... [1]

(c) A database has a data dictionary.

Give three items that are stored in a data dictionary.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

8 Tick () one box in each row to identify the logic gate that each statement describes.

Statement AND NAND NOR XOR OR

The output is 1 only when both inputs are 1

The output is 1 only when both inputs are different

The output is 1 only when both inputs are 0

[3]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 9618/11/M/J/21


MUHAMMAD ALI KHAN
PAGE 735

Cambridge International AS & A Level

COMPUTER SCIENCE 9618/11


Paper 1 Theory Fundamentals May/June 2021
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.

This document consists of 10 printed pages.

© UCLES 2021 [Turn over


MUHAMMAD ALI KHAN
PAGE 736
9618/11 Cambridge International AS & A Level – Mark Scheme May/June 2021
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2021 Page 2 of 10


MUHAMMAD ALI KHAN
PAGE 737
9618/11 Cambridge International AS & A Level – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

1(a)(i) 1 mark for each description 2

Pixel:
• A single square of one colour
• The smallest addressable element in an image

File header:
• Data about the bitmap image (e.g. number of colours)

1(a)(ii) 1 mark per bullet point for working, 1 mark for answer 3

Working:
• 1024 × 512 = 524ௗ288 pixels/bytes
• 524288 / 1024 / 1024

Answer:
0.50 mebibytes

1(b) 1 mark for naming method, 1 mark per description to max 2 3

• Run-length encoding
• Replace sequences of the same colour pixel
• … with colour code and number of identical pixels

1(c)(i) 252 1

1(c)(ii) 1 mark per bullet point 3

• Converting 15 to binary 0000 1111


• Method for addition
• Final answer
0010 0011
+ 0000 1111
0011 0010
1 111

1(c)(iii) 1 mark per bullet point 3

• Converting í10 to two's complement binary 1111 0110


• Adding values
• Final answer 0001 1001
10 = 0000 1010
–10 = 1111 0110

0010 0011
+ 1111 0110
0001 1001
11 11

© UCLES 2021 Page 3 of 10


MUHAMMAD ALI KHAN
PAGE 738
9618/11 Cambridge International AS & A Level – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

1(d) 1 mark per bullet point to max 2 2

• The formal and legal rights to ownership // intellectual property rights


• Protects against unauthorised reproduction of work
• Provides for legal right of redress

Question Answer Marks

2(a) 1 mark for each correct line 4

2(b) 1 mark per bullet point to max 4 4

• memory management
• file management
• security management
• hardware / device / peripheral / resources management
• input/output management
• process management
• error checking and recovery
• provision of a platform for software
• provision of a user interface

© UCLES 2021 Page 4 of 10


MUHAMMAD ALI KHAN
PAGE 739
9618/11 Cambridge International AS & A Level – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

3(a) 1 mark for each completed statement 5

The Program Counter holds the address of the next instruction to be loaded.
This address is sent to the Memory Address Register.
The Memory Data Register holds the data fetched from this address. This
data is sent to the Current Instruction Register and the Control Unit
decodes the instruction’s opcode.
The Program Counter is incremented.

3(b) 1 mark for each shaded set of values 6

Instruction Memory address


ACC IX Output
address 365 366 367 368
1 3 65 66 0
200 1
201
202
203 2
204 2
205 2
206 65
207 A
208
200 2
201
202
203 3
204 3
205 3
206 66
207 B
208
200 3
201
202
209

© UCLES 2021 Page 5 of 10


MUHAMMAD ALI KHAN
PAGE 740
9618/11 Cambridge International AS & A Level – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

3(c)(i) 1
1 1 0 1 0 1 0 0

3(c)(ii) 1 mark for correct answer 1

The number is divided by 8 (and only whole number retained)

Question Answer Marks

4(a) 1 mark per bullet point to max 2 2

• All computers are of equal status


• Each computer provides access to resources and data // data is
distributed
• Computers can communicate and share resources
• Each computer is responsible for its own security

4(b) 1 mark per bullet point to max 2 per drawback 4

• Reduced security // no central management of security


• … only as secure as the weakest computer on the network
• … each computer is at risk from viruses from other computers

• No central management of backup


• ... if the data from one computer is not backed up it is lost to all of them

• No central management of files/software


• … consistency may be difficult to maintain
• … each computer may have different software from the others

• Individual computers may respond slower


• … because they are being accessed by other computers

• In order to share files etc. all the computers involved need to be switched
on
• ... so the files etc. may not be always available

© UCLES 2021 Page 6 of 10


MUHAMMAD ALI KHAN
PAGE 741
9618/11 Cambridge International AS & A Level – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

4(c)(i) 1 mark for first 2 ticks, 1 mark for last 2 (shaded) 2

Performed Not performed


Task
by router by router

Receives packets from devices 9

Finds the IP address of a Uniform 9


Resource Locator (URL)

Directs each packet to all devices 9


attached to it

Stores the IP and/or MAC address of all 9


devices attached to it

4(c)(ii) 1 mark per bullet point for justification up to max 3 3

No mark for identification of wired/wireless

Wired
• Faster connection // higher bandwidth
• …. needed as she is downloading/streaming large files
• … less time waiting / less latency / fewer delays
• More reliable / stable connection
• … is less susceptible to issues with distance/walls/interference
• More secure

Wireless
• Freedom of movement
• … can move between different rooms with a mobile device and still
receive/transmit data
• … no need of a physical connection
• Easily expanded if friends want to access the same network
• Less cabling / expertise is needed
• ... making the initial setup less expensive

4(d) 1 mark for identifying that she is using both. 3


1 mark per bullet point for justification

• using internet because sending data on the infrastructure


• using WWW because accessing a website (that is stored on a web
server operated by the webmail) that is part of the WWW

© UCLES 2021 Page 7 of 10


MUHAMMAD ALI KHAN
PAGE 742
9618/11 Cambridge International AS & A Level – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

5(a) 1 mark per bullet point to max 2 2

• Definition: Microprocessor/microcontroller within a larger system //


microprocessor/microcontroller that performs one specific task

• Example: e.g. Embedded system in washing machine only controls the


programs for the washing cycle // it is part of the washing machine but
does not perform any other function within it

5(b) 1 mark for RAM, 1 mark for ROM 2

RAM:
• Store the choices/wash program the user has entered // stores the data
read from the sensors // stores the time left in the program // by example

ROM:
• Store the start-up instructions (for the washing cycles)

5(c) 1 mark per bullet point 2

• The system uses feedback


• The system causes the temperature to change // produces an action

Question Answer Marks

6(a) Range (check) 1

6(b) Presence (check) 1

6(c) Existence (check) 1

© UCLES 2021 Page 8 of 10


MUHAMMAD ALI KHAN
PAGE 743
9618/11 Cambridge International AS & A Level – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

7(a) 1 mark per bullet point to max 3 3

• Flat-file has more data redundancy


• … because the same data is stored many times // data is stored in
different tables which are linked

• There is program-data dependence with flat-files


• ... because any changes to the structure of the data means the programs
that access that data have to be re-written

• Flat-file has more data inconsistency // worse data integrity


• ... because duplicated data might be stored differently //…because when
data is updated in one place, it is not updated everywhere

• It is not easy to perform complex searches /queries


• … because a new program has to be written each time

• Flat files could have a lack of privacy


• … as user views cannot easily be implemented

7(b)(i) 1 mark for each correct example 3

one-to-one
• e.g. customer to payment details // customer to login details
one-to-many
• e.g. customer to order
many-to-many
• e.g. order to product // customer to product

7(b)(ii) 1 mark 1

Relationship Tick (9)

one-to-one

one-to-many

many-to-many 9

7(b)(iii) 1 mark 1

CREATE DATABASE SHOPORDERS;

7(c) 1 mark per item to max 3 3

• table name
• field name // attribute
• data type
• type of validation
• Primary Key
• Foreign Key
• relationships

© UCLES 2021 Page 9 of 10


MUHAMMAD ALI KHAN
PAGE 744
9618/11 Cambridge International AS & A Level – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

8 1 mark per correct row 3

Statement AND NAND NOR XOR OR

The output is 1 only when


9
both inputs are 1

The output is 1 only when


9
both inputs are different

The output is 1 only when


9
both inputs are 0

© UCLES 2021 Page 10 of 10


MUHAMMAD ALI KHAN
PAGE 745

Cambridge International AS & A Level


* 3 0 1 4 9 9 4 8 4 1 *

COMPUTER SCIENCE 9618/12


Paper 1 Theory Fundamentals May/June 2021
1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.

INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (LK) 205797/1
© UCLES 2021 [Turn over
MUHAMMAD ALI KHAN
PAGE 746

1 Raj owns houses that other people rent from him. He has a database that stores details about
the people who rent houses, and the houses they rent. The database, HOUSE_RENTALS, has the
following structure:

CUSTOMER(CustomerID, FirstName, LastName, DateOfBirth, Email)


HOUSE(HouseID, HouseNumber, Road, Town, Bedrooms, Bathrooms)
RENTAL(RentalID, CustomerID, HouseID, MonthlyCost, DepositPaid)

(a) Give the definition of the following database terms, using an example from the database
HOUSE_RENTALS for each definition.

Term Definition and example

..............................................................................................................................
Field
..............................................................................................................................

..............................................................................................................................

..............................................................................................................................
Entity
..............................................................................................................................

..............................................................................................................................

..............................................................................................................................
Foreign key
..............................................................................................................................

..............................................................................................................................
[6]

(b) Tick () one box to identify whether the database HOUSE_RENTALS is in Third Normal Form
(3NF) or not in 3NF.
Justify your choice using one or more examples from the database HOUSE_RENTALS.

In 3NF

Not in 3NF

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2021 9618/12/M/J/21


MUHAMMAD ALI KHAN
PAGE 747

(c) Example data from the table RENTAL are given:

RentalID CustomerID HouseID MonthlyCost DepositPaid


1 22 15B5L 1000.00 Yes
2 13 3F 687.00 No
3 1 12AB 550.00 Yes
4 3 37 444.50 Yes

(i) Complete the following Data Definition Language (DDL) statement to define the table
RENTAL.

CREATE ...................................... ...................................... (

RentalID INTEGER NOT NULL,

CustomerID INTEGER NOT NULL,

HouseID ...................................... (5) NOT NULL,

MonthlyCost ...................................... NOT NULL,

DepositPaid BOOLEAN NOT NULL,

.......................................................... (RentalID)

);
[4]

(ii) Write a Data Manipulation Language (DML) script to return the first name and last name
of all customers who have not paid their deposit.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

© UCLES 2021 9618/12/M/J/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 748

2 Aisha manages a team of software developers.

(a) Explain the reasons why it is important that Aisha acts ethically in relation to her team
members.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) The team are developing a computer game where the user plays a board game (such as
chess) against the computer.

Describe how the computer would use Artificial Intelligence (AI) to play the board game.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(c) The final game will be released under a licence.

Tick () one or more boxes in each row to identify the licence(s) each statement describes.

Free Open
Commercial
Statement Software Source Shareware
Software
Foundation Initiative

The user can edit the source code

The user must always pay before being


able to use the software

The user can redistribute the software

The user always gets a trial period

[4]

© UCLES 2021 9618/12/M/J/21


MUHAMMAD ALI KHAN
PAGE 749

3 A logic expression is given:

S = (A AND B AND C) OR (B XOR C)

(a) Draw the logic circuit for the given expression.

B S

[4]

(b) Complete the truth table for the logic expression:

S = (A AND B AND C) OR (B XOR C)

A B C Working space S

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[2]

© UCLES 2021 9618/12/M/J/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 750

4 The table shows part of the instruction set for a processor. The processor has one general purpose
register, the Accumulator (ACC), and an Index Register (IX).

Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
Direct addressing. Load the contents of the location at the given address to
LDD <address>
ACC
STO <address> Store contents of ACC at the given address
ADD <address> Add the contents of the given address to the ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
DEC <register> Subtract 1 from the contents of the register (ACC or IX)
CMP <address> Compare the contents of ACC with the contents of <address>
JPE <address> Following a compare instruction, jump to <address> if the compare was True
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
IN Key in a character and store its ASCII value in ACC
OUT Output to the screen the character whose ASCII value is stored in ACC
END Return control to the operating system
# denotes a denary number, e.g. #123

The current contents of the main memory and selected values from the ASCII character set are:

Address Instruction ASCII code table (selected codes only)


70 IN ASCII code Character
71 CMP 100 65 A
72 JPE 80 66 B
73 CMP 101 67 C
74 JPE 76 68 D
75 JMP 80
76 LDD 102
77 INC ACC
78 STO 102
79 JMP 70
80 LDD 102
81 DEC ACC
82 STO 102
83 JMP 70

100 68
101 65
102 100

© UCLES 2021 9618/12/M/J/21


MUHAMMAD ALI KHAN
PAGE 751

(a) Complete the trace table for the program currently in main memory when the following
characters are input:

A D
Do not trace the program any further when the third input is required.

Instruction Memory address


ACC
address 100 101 102
68 65 100

[4]

© UCLES 2021 9618/12/M/J/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 752

(b) Some bit manipulation instructions are shown in the table:

Instruction
Explanation
Opcode Operand
AND #n Bitwise AND operation of the contents of ACC with the operand
AND <address> Bitwise AND operation of the contents of ACC with the contents of <address>
XOR #n Bitwise XOR operation of the contents of ACC with the operand
XOR <address> Bitwise XOR operation of the contents of ACC with the contents of <address>
OR #n Bitwise OR operation of the contents of ACC with the operand
OR <address> Bitwise OR operation of the contents of ACC with the contents of <address>
<address> can be an absolute address or a symbolic address
# denotes a denary number, e.g. #123

The contents of the memory address 300 are shown:

Bit Number 7 6 5 4 3 2 1 0

300 0 1 1 0 0 1 1 0

(i) The contents of memory address 300 represent an unsigned binary integer.

Write the denary value of the unsigned binary integer in memory address 300.

..................................................................................................................................... [1]

(ii) An assembly language program needs to test if bit number 2 in memory address 300
is a 1.

Complete the assembly language instruction to perform this test.

......................... #4
[1]

(iii) An assembly language program needs to set bit numbers 4, 5, 6 and 7 to 0, but keep
bits 0 to 3 with their existing values.

Write the assembly language instruction to perform this action.

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2021 9618/12/M/J/21


MUHAMMAD ALI KHAN
PAGE 753

5 Seth uses a computer for work.

(a) Complete the following descriptions of internal components of a computer by writing the
missing terms.

The ............................................................ transmits the signals to coordinate events based

on the electronic pulses of the ............................................................ .

The ............................................................ carries data to the components, while the

............................................................ carries the address where data needs to be written to

or read from.

The ............................................................ performs mathematical operations and

logical comparisons.
[5]

(b) Describe the ways in which the following factors can affect the performance of his laptop
computer.

Number of cores

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Clock speed

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2021 9618/12/M/J/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 754

10

(c) Seth accesses both software and data using cloud computing.

(i) Give two benefits of storing data using cloud computing.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(ii) Give two drawbacks of Seth using cloud computing.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2021 9618/12/M/J/21


MUHAMMAD ALI KHAN
PAGE 755

11

(d) Draw one line from each term to its most appropriate description.

Term Description

It is only visible to devices within the Local


Area Network (LAN)

Public IP address
It increments by 1 each time the device
connects to the internet

Private IP address A new one is reallocated each time a device


connects to the internet

Dynamic IP address It can only be allocated to a router

It is visible to any device on the internet


Static IP address

It does not change each time a device


connects to the internet

[4]

© UCLES 2021 9618/12/M/J/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 756

12

6 A computer uses the ASCII character set.

(a) State the number of characters that can be represented by the ASCII character set and the
extended ASCII character set.

ASCII ...........................................................

Extended ASCII ...........................................................


[2]

(b) Explain how a word such as ‘HOUSE’ is represented by the ASCII character set.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) Unicode is a different character set.

The Unicode value for the character ‘1’ is denary value 49.

(i) Write the hexadecimal value for the Unicode character ‘1’.

..................................................................................................................................... [1]

(ii) Write the denary value for the Unicode character ‘5’.

..................................................................................................................................... [1]

© UCLES 2021 9618/12/M/J/21


MUHAMMAD ALI KHAN
PAGE 757

13

7 Jennifer is writing a computer program for her A Level homework.

(a) Jennifer uses a program library to help her write her computer program.

Describe how a program library can be used while writing a computer program.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Jennifer uses an Integrated Development Environment (IDE) to write her computer program.

(i) The IDE allows Jennifer to use both an interpreter and a compiler while creating her
computer program.

Describe the ways in which Jennifer can use both a compiler and an interpreter while
developing the program.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) Identify two debugging tools that a typical IDE can provide.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2021 9618/12/M/J/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 758

14

8 A company has several security measures in place to prevent unauthorised access to the data on
its computers.

(a) Describe the difference between the security and privacy of data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Each employee has a username and password to allow them to log onto a computer. An
employee’s access rights to the data on the computers is set to either read-only, or read and
write.

Identify one other software-based measure that could be used to restrict the access to the
data on the computers.

...................................................................................................................................................

............................................................................................................................................. [1]

(c) The company is also concerned about threats posed by networks and the internet.

Identify two threats to the data that are posed by networks and the internet.

Threat 1 ....................................................................................................................................

...................................................................................................................................................

Threat 2 ....................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2021 9618/12/M/J/21


MUHAMMAD ALI KHAN
PAGE 759

15

BLANK PAGE

© UCLES 2021 9618/12/M/J/21


MUHAMMAD ALI KHAN
PAGE 760

16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 9618/12/M/J/21


MUHAMMAD ALI KHAN
PAGE 761

Cambridge International AS & A Level

COMPUTER SCIENCE 9618/12


Paper 1 Theory Fundamentals May/June 2021
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.

This document consists of 10 printed pages.

© UCLES 2021 [Turn over


MUHAMMAD ALI KHAN
PAGE 762
9618/12 Cambridge International AS & A Level – Mark Scheme May/June 2021
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2021 Page 2 of 10


MUHAMMAD ALI KHAN
PAGE 763
9618/12 Cambridge International AS & A Level – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

1(a) 1 mark for definition, 1 mark for appropriate example in each 6

Term Definition and example

A column/attribute in a table
Field
e.g. CustomerID in the table CUSTOMER

Anything that data can be stored about


Entity
e.g. A customer or a house

Foreign A field in one table that is linked to a Primary Key in another


Key table e.g. CustomerID / HouseID in table RENTAL

1(b) 1 mark per bullet point to max 2 2


• All fields in all tables are dependant fully on the PK and on no other fields
• for example all fields in Customer table are fully dependent on
CustomerID

1(c)(i) 1 mark for each correctly completed line 4

CREATE TABLE RENTAL(


RentalID INTEGER NOT NULL,
CustomerID INTEGER NOT NULL,
HouseID VARCHAR (5) NOT NULL,
MonthlyCost REAL/CURRENCY NOT NULL,
DepositPaid BOOLEAN NOT NULL,
PRIMARY KEY (RentalID)
);

1(c)(ii) 1 mark per bullet point 4

• Select FirstName and LastName


• From both tables
• Where DepositPaid = No
• Joining tables (either AND, or INNER JOIN)

Example script:
SELECT FirstName, LastName
FROM CUSTOMER, RENTAL
WHERE DepositPaid = No
AND RENTAL.CustomerID = CUSTOMER.CustomerID;

© UCLES 2021 Page 3 of 10


MUHAMMAD ALI KHAN
PAGE 764
9618/12 Cambridge International AS & A Level – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

2(a) 1 mark per bullet point to max 2 2

• To make sure the team members feel valued


• To get the best work out of the team
• To enable them to work well together
• To enable them to create the best product for the client

2(b) 1 mark per bullet point to max 3 3

• The rules / past moves / decision making algorithms of the game will be
stored
• The AI program is trained, by playing many times
• AI will look (ahead) at possible moves
• ... and/or analyse the pattern of past choices
• … and choose the move most likely to be successful
• Computer could learn how to improve // learn from previous mistakes
• … by storing the positive/negative result of choices
• ... and changing its future choices

2(c) 1 mark for each correct column 4

Free Open
Commercial
Statement Software Source Shareware
Software
Foundation Initiative

The user can edit


9 9
the source code

The user must


always pay before
9
being able to use
the software

The user can


redistribute the 9 9 9
software

The user always


9
gets a trial period

© UCLES 2021 Page 4 of 10


MUHAMMAD ALI KHAN
PAGE 765
9618/12 Cambridge International AS & A Level – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

3(a) 1 mark for each correct gate, with correct inputs 4

3(b) 1 mark for each half (shaded) 2

A B C Working space S

0 0 0 0

0 0 1 1

0 1 0 1

0 1 1 0

1 0 0 0

1 0 1 1

1 1 0 1

1 1 1 1

© UCLES 2021 Page 5 of 10


MUHAMMAD ALI KHAN
PAGE 766
9618/12 Cambridge International AS & A Level – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

4(a) 1 mark for each shaded section / bullet point 4

• Load 65 into ACC


• Load 100 into ACC, increment and store in 102
• Load 68 into ACC
• Load 101 into ACC, decrement and store in 102

Memory address
Instruction
ACC
address
100 101 102

68 65 100

70 65

71

72

73

74

76 100

77 101

78 101

79

70 68

71

72

80 101

81 100

82 100

83

(70)

4(b)(i) 102 1

4(b)(ii) AND 1

© UCLES 2021 Page 6 of 10


MUHAMMAD ALI KHAN
PAGE 767
9618/12 Cambridge International AS & A Level – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

4(b)(iii) 1 mark for AND, 1 mark for #15 2

AND #15

Question Answer Marks

5(a) 1 mark for each term correctly inserted 5

The control unit/bus transmits the signals to coordinate events based on the
pulses of the (system) clock.

The data bus carries data to components, while the address bus carries the
address where data is being written to or read from.

The arithmetic logic unit/ALU performs mathematical operations and logical


comparisons.

5(b) 1 mark per bullet point to max 3 per factor. max 4 overall. 4

Number of cores:
• Each core processes one instruction per clock pulse
• More/multiple cores mean that sequences of instructions can be split
between them
• … and so more than one instruction is executed per clock pulse // more
sequences of instructions can be run at the same time
• More cores decreases the time taken to complete task

Clock speed:
• Each instruction is executed on a clock pulse // one F-E cycle is run on
each clock pulse
• ... so the clock speed dictates the number of instructions that can be run
per second
• The faster the clock speed the more instructions can be run per second

5(c)(i) 1 mark per bullet point to max 2 2

• Cloud storage can be free (for small quantities )


• No need for separate (high capacity) storage devices // saves storage on
existing devices
• Can access data from any computer with internet access
• Most cloud data services will have in-built backup/disaster recovery
• Security could be better
• Can easily increase capacity
• Data can be easily shared

© UCLES 2021 Page 7 of 10


MUHAMMAD ALI KHAN
PAGE 768
9618/12 Cambridge International AS & A Level – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

5(c)(ii) 1 mark per bullet point to max 2: 2

• Can only access (the cloud) with internet access


• Security may not be strong // no control over security
• There may not be any backups // no control over backups
• It can take a long time to upload/download the data
• It can be more expensive in the long term
• There could be a limit to the amount of storage unless paid for
• There could be compatibility/access issues
• There could be issues with the company offering cloud services

5(d) 1 mark for each correct line 4

Question Answer Marks

6(a) 1 mark for each correct answer 2

ASCII = 128 // 27

Extended ASCII = 256 // 28

6(b) 1 mark per bullet point to max 2 2

• Each character has its own unique code


• Each character in the word is replaced by its code
• The codes are stored in the order in the word

© UCLES 2021 Page 8 of 10


MUHAMMAD ALI KHAN
PAGE 769
9618/12 Cambridge International AS & A Level – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

6(c)(i) 31 1

6(c)(ii) 53 1

Question Answer Marks

7(a) 1 mark per bullet point to max 2 2

• Program libraries store pre-written functions and routines


• The program library can be referenced/imported
• the functions/routines can be called in her own program

7(b)(i) 1 mark per bullet point to max 4; max 3 from each section 4

Interpreter:
• Use an interpreter while writing the program
• … to test/debug the partially completed program
• … because errors can be corrected and processing continue from where
the execution stopped // errors can be corrected in real time // errors are
identified one at a time

Compiler:
• Use the compiler after the program is complete
• … to create an executable file
• Use the compiler to repeatedly test the same (completed) section
• … without having to re-interpret every time // compiler not needed at run-
time

7(b)(ii) 1 mark per correct tool to max 2 2

e.g.
• Breakpoints
• Single stepping
• Report windows

Question Answer Marks

8(a) 1 mark per bullet point 2

• Security protects data against loss


• Privacy protects data against unauthorised access

8(b) 1 mark for a correct answer 1

• Two factor authentication


• Biometric passwords
• Key Card Access
• Firewall

© UCLES 2021 Page 9 of 10


MUHAMMAD ALI KHAN
PAGE 770
9618/12 Cambridge International AS & A Level – Mark Scheme May/June 2021
PUBLISHED

Question Answer Marks

8(c) 1 mark per correct answer to max 2 2

• Malware // viruses // spyware // by example


• Hacking
• Phishing
• Pharming

© UCLES 2021 Page 10 of 10


MUHAMMAD ALI KHAN
PAGE 771

Cambridge International AS & A Level


* 1 9 4 9 4 4 2 0 6 4 *

COMPUTER SCIENCE 9618/11


Paper 1 Theory Fundamentals October/November 2021
1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.

INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (CE/FC) 221502
© UCLES 2021 [Turn over
MUHAMMAD ALI KHAN
PAGE 772

1 (a) Draw one line from each binary value to its equivalent (same) value on the right.

Binary value
1 kibibyte

8 bits

1 gigabyte

8000 bits

1 byte

1000 kilobytes

1 kilobyte

1024 mebibytes

1 gibibyte

8192 bits

1 megabyte

1 mebibyte

[5]

(b) (i) Perform the following binary addition. Show your working.

10101010
+ 00110111

[2]

(ii) State how an overflow can occur when adding two binary integers.

...........................................................................................................................................

..................................................................................................................................... [1]

(c) Convert the hexadecimal value F0 into denary.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2021 9618/11/O/N/21


MUHAMMAD ALI KHAN
PAGE 773

2 Xanthe wants to maintain the integrity and security of data stored on her computer.

(a) Explain the difference between data security and data integrity.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Xanthe uses both data validation and data verification when entering data on her computer.

(i) Describe how data validation helps to protect the integrity of the data. Give an example
in your answer.

Description ........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Example ............................................................................................................................
[2]

(ii) Describe how data verification helps to protect the integrity of the data. Give an example
in your answer.

Description ........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Example ............................................................................................................................
[2]

(c) Two malware threats are spyware and viruses.

Give two similarities and one difference between spyware and a virus.

Similarity 1 ................................................................................................................................

...................................................................................................................................................

Similarity 2 ................................................................................................................................

...................................................................................................................................................

Difference .................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2021 9618/11/O/N/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 774

3 A logic circuit is shown:

A
B X

(a) Write the logic expression for the logic circuit.

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Complete the truth table for the given logic circuit.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1

[2]

© UCLES 2021 9618/11/O/N/21


MUHAMMAD ALI KHAN
PAGE 775

(c) Identify one logic gate not used in the given logic circuit. Draw the symbol for the logic gate
and complete its truth table.

Logic gate: ………………………………

Symbol:

Truth table:

A B Output

0 0

0 1

1 0

1 1
[3]

© UCLES 2021 9618/11/O/N/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 776

4 Francis is starting his first job as a software developer for a multinational company.

(a) Francis has been advised to join a professional ethical body.

Describe the benefits to Francis of joining a professional ethical body.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Francis is shown the software he will be working on. He is unfamiliar with the Integrated
Development Environment (IDE) he is required to use.

(i) Describe the ways in which Francis can act ethically in this situation.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) A typical IDE provides debugging tools to support the testing of a program.

Identify three other tools or features found in a typical IDE to support the writing of the
program.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

(c) Francis is part of a team writing a program. He finds an error in part of the program that
has already been tested. He decides not to tell anyone because he is worried about the
consequences.

Explain the reasons why Francis acted unethically in this situation.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]
© UCLES 2021 9618/11/O/N/21
MUHAMMAD ALI KHAN
PAGE 777

(d) Francis’s team use language translators.

Complete the descriptions of language translators by writing the missing words.

............................................... are usually used when a high-level language program is

complete. They translate all the code at the same time and then run the program.

They produce ............................................... files that can be run without the source code.

............................................... translate one line of a high-level language program at a time,

and then run that line of code. They are most useful while developing the programs because

errors can be corrected and then the program continues from that line.

Assemblers are used to translate assembly code into ............................................... .


[4]

© UCLES 2021 9618/11/O/N/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 778

5 Javier owns many shops that sell cars. He employs several managers who are each in charge of
one or more shops. He uses the relational database CARS to store the data about his business.

Part of the database is shown:

SHOP(ShopID, ManagerID, Address, Town, TelephoneNumber)

MANAGER(ManagerID, FirstName, LastName, DateOfBirth, Wage)

CAR(RegistrationNumber, Make, Model, NumberOfMiles, ShopID)

(a) Tick (9) one box in each row to identify whether each field is a primary key or a foreign key.

Table Field name Primary key Foreign key

MANAGER ManagerID

SHOP ManagerID

CAR RegistrationNumber

CAR ShopID

[2]

(b) Describe the ways in which access rights can be used to protect the data in Javier’s database
from unauthorised access.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2021 9618/11/O/N/21


MUHAMMAD ALI KHAN
PAGE 779

(c) Javier uses Data Definition Language (DDL) and Data Manipulation Language (DML)
statements in his database.

(i) Complete the following DML statements to return the number of cars for sale in each
shop.

SELECT COUNT(.........................................................)

FROM .........................................................

......................................................... ShopID
[3]

(ii) Complete the DML statement to include the following car in the table CAR.

Field Data

RegistrationNumber 123AA

Make Tiger

Model Lioness

NumberOfMiles 10500

ShopID 12BSTREET

........................ ........................ CAR

............................ ("123AA","Tiger","Lioness",10500,"12BSTREET")
[2]

© UCLES 2021 9618/11/O/N/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 780

10

BLANK PAGE

© UCLES 2021 9618/11/O/N/21


MUHAMMAD ALI KHAN
PAGE 781

11

6 (a) There are two errors in the following register transfer notation for the fetch-execute cycle.

1 MAR [PC]

2 PC >3&@í

3 MDR [MAR]

4 CIR [MDR]

Complete the following table by:


• identifying the line number of each error
• describing the error
• writing the correct statement.

Line
Description of the error Correct statement
number

[4]

© UCLES 2021 9618/11/O/N/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 782

12

(b) The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).

Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
LDD <address> Direct addressing. Load the contents of the location at the given address to
ACC
STO <address> Store the contents of ACC at the given address
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP <address> Compare the contents of ACC with the contents of <address>
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
IN Key in a character and store its ASCII value in ACC
OUT Output to the screen the character whose ASCII value is stored in ACC
END Return control to the operating system
XOR #n Bitwise XOR operation of the contents of ACC with the operand
XOR <address> Bitwise XOR operation of the contents of ACC with the contents of <address>
AND #n Bitwise AND operation of the contents of ACC with the operand
AND <address> Bitwise AND operation of the contents of ACC with the contents of <address>
OR #n Bitwise OR operation of the contents of ACC with the operand
OR <address> Bitwise OR operation of the contents of ACC with the contents of <address>
LSL #n Bits in ACC are shifted logically n places to the left. Zeros are introduced on
the right hand end
LSR #n Bits in ACC are shifted logically n places to the right. Zeros are introduced on
the left hand end
<address> can be an absolute or symbolic address
# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001101

The current contents of main memory are shown:

Address Data
100 00001111
101 11110000
102 01010101
103 11111111
104 00000000

© UCLES 2021 9618/11/O/N/21


MUHAMMAD ALI KHAN
PAGE 783

13

Each row of the following table shows the current contents of ACC in binary and the instruction
that will be performed on those contents.

Complete the table by writing the new contents of the ACC after the execution of each
instruction.

Current contents of the ACC Instruction New contents of the ACC

11111111 OR 101

00000000 XOR #15

10101010 LSR #2

01010101 AND 104

[4]

© UCLES 2021 9618/11/O/N/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 784

14

7 Bobby is recording a sound file for his school project.

(a) He repeats the recording of the sound several times, with a different sample rate each time.

(i) Describe the reasons why the sound is closer to the original when a higher sample rate
is used.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Describe the reasons why the sound file size increases when a higher sample rate is
used.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(b) Bobby wants to email the sound file to his school email address. He compresses the file
before sending the email.

(i) Explain the reasons why Bobby compresses the sound file.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Bobby uses lossless compression.

Describe how lossless compression can compress the sound file.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2021 9618/11/O/N/21


MUHAMMAD ALI KHAN
PAGE 785

15

8 A school is setting up a network within one of its buildings.

(a) State whether the network will be a LAN (local area network) or a WAN (wide area network).
Justify your choice.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) One classroom in the building has 30 computers. The computers need to be connected to the
network. Each computer has a network interface card (NIC).

Identify two possible devices that can be used to physically connect the 30 computers to the
rest of the network.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(c) The school has several laptops. Each laptop has a Wireless Network Interface Card (WNIC).

Describe the functions of a Wireless Network Interface Card.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 9618/11/O/N/21


MUHAMMAD ALI KHAN
PAGE 786

16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 9618/11/O/N/21


MUHAMMAD ALI KHAN
PAGE 787

Cambridge International AS & A Level

COMPUTER SCIENCE 9618/11


Paper 1 Theory Fundamentals October/November 2021
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2021 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 9 printed pages.

© UCLES 2021 [Turn over


MUHAMMAD ALI KHAN
PAGE 788
9618/11 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2021

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2021 Page 2 of 9


MUHAMMAD ALI KHAN
PAGE 789
9618/11 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

1(a) 1 mark for each correct line 5

1 kibibyte
8 bits

1 gigabyte
8000 bits

1 byte
1000
kilobytes

1 kilobyte
1024
mebibytes

1 gibibyte

8192 bits

1 megabyte

1 mebibyte

1(b)(i) 1 mark for answer 2


1 mark for working

e.g.

1010 1010
0011 0111
1110 0001
111 111

1(b)(ii) The result is a larger number than can be stored in the given number of bits. 1
// The result is greater than 255

1(c) 240 1

© UCLES 2021 Page 3 of 9


MUHAMMAD ALI KHAN
PAGE 790
9618/11 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

2(a) 1 mark per bullet point 2

• security is protecting data from loss / corruption


• integrity is ensuring the consistency / accuracy of the data

2(b)(i) 1 mark per bullet point 2

• validation checks that data is reasonable / sensible


• example e.g. checking data is the right number / type of characters

2(b)(ii) 1 mark per bullet point 2

• verification checks that data is the same as the original


• by example e.g. double entry

2(c) 1 mark per similarity to max 2 3

• Both are pieces of malicious software


• Both are downloaded / installed/run without the user's knowledge
• Both can pretend to be / are embedded in other legitimate software when
downloaded // both try to avoid the firewall
• Both run in the background

1 mark for difference

• Virus can damage computer data; spyware only records / accesses data
• Virus does not send data out of the computer; spyware sends recorded
data to third party
• Virus replicates itself; spyware does not replicate itself

Question Answer Marks

3(a) 1 mark per bullet point 3

• A AND B …
• … XOR C …
• … OR NOT B

((A AND B) XOR C) OR NOT B

© UCLES 2021 Page 4 of 9


MUHAMMAD ALI KHAN
PAGE 791
9618/11 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

3(b) 1 mark for each set of 4 rows (shaded) 2

A B C Working space X

0 0 0 1

0 0 1 1

0 1 0 0

0 1 1 1

1 0 0 1

1 0 1 1

1 1 0 1

1 1 1 0

3(c) 1 mark for gate, 1 mark for matching symbol, 1 mark for matching truth table 3

NOR

A B OUTPUT

0 0 1

0 1 0

1 0 0

1 1 0
NAND

A B OUTPUT

0 0 1

0 1 1

1 0 1

1 1 0

© UCLES 2021 Page 5 of 9


MUHAMMAD ALI KHAN
PAGE 792
9618/11 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

4(a) 1 mark per bullet point to max 3 3


e.g.
• He has ethical guidelines to follow
• … so clients/other staff know the standards being applied
• … so he does not have to decide what is ethical it's written down

• Clients / staff know he is reputable


• … recognition of his skills / knowledge
• … there may be a test / requirements for entry

• They provide help and support


• … for example if he needs legal advice

• They run training courses


• … to keep his skills up-to-date

4(b)(i) 1 mark per bullet point to max 2 2


e.g.
• He can tell the manager he has not used it
• … and how he will get up-to-date
• He can perform his own research on how to use it
• He can explain to the manager that he needs additional training
• He can(ask the manager to book on a training course
• He can ask for a mentor / to shadow someone
• He can practice at home before starting

4(b)(ii) 1 mark for each correct tool 3


e.g.
• Colour coding // pretty printing
• Auto-complete
• Auto-correct
• Context sensitive prompts
• Expand and collapse code blocks

4(c) 1 mark per bullet point to max 2 2


e.g.
• He didn’t act in best interest of product
• … because the product might fail because he didn’t report the error

• He didn’t act in best interest of client


• … because if the product does not work then they have been let down
because he didn't report the error

• He didn’t act in the best interest of the profession


• … he is letting his profession down because he didn't report the error

• He didn’t act in best interest of the company


• ... not correcting the error early could lead to later problems

© UCLES 2021 Page 6 of 9


MUHAMMAD ALI KHAN
PAGE 793
9618/11 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

4(d) 1 mark for each correctly completed term 4

Compilers are usually used when a high-level language program is complete.


They translate all the code at the same time and then run the program. They
produce executable/.exe/object code files that can be run without the source
code.
Interpreters translate one line of a high-level language program at a time,
and then run that line of code. They are most useful while developing the
programs because errors can be corrected and then the program continues
from that line.
Assemblers are used to translate assembly code into binary/machine code.

Question Answer Marks

5(a) 1 mark for 2 or 3 correct ticks, 2 marks for 4 correct ticks 2

Primary Foreign
Table Field name
Key (PK) Key (FK)

MANAGER ManagerID 9

SHOP ManagerID 9

CAR RegistrationNumber 9

CAR ShopID 9

5(b) 1 mark per bullet point 3

• Access rights give managers / himself access to different elements


• … by having different accounts / logins
• … which have different access rights e.g. read only // no access / read /
write
• Specific views can be assigned to himself and to the managers
• … e.g. managers can only see the data for their own shop(s)

5(c)(i) 1 mark per correctly completed statement 3

SELECT COUNT(RegistrationNumber)
FROM CAR
GROUP BY ShopID

5(c)(ii) 1 mark for each correct statement 2

INSERT INTO CAR


VALUES ("123AA","Tiger","Lioness",10500,"12BSTREET")

© UCLES 2021 Page 7 of 9


MUHAMMAD ALI KHAN
PAGE 794
9618/11 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

6(a) 1 mark for identification of line and description of error 4


1 mark for the correct statement

Line
Description of the error Correct statement
number

2 Program Counter should be incremented,


PC ← [PC] + 1
not decremented

3 It should be the contents of the address in


MDR ← [[MAR]]
the MAR

6(b) 1 mark for each correct row 4

Current contents of the ACC Instruction New contents of the ACC

11111111 OR 101 11111111

00000000 XOR #15 00001111

10101010 LSR #2 00101010

01010101 AND 104 00000000

Question Answer Marks

7(a)(i) 1 mark per bullet point 2

• Smaller time gaps between the samples


• Makes the digital sound wave more accurate
• Smaller quantisation errors

7(a)(ii) 1 mark per bullet point 2

• More samples/data are taken/recorded


• … so more bits are stored altogether

7(b)(i) 1 mark per bullet point 2

• Reduces the file size


• Faster to transmit/download
• Original file is too large for email storage/attachment

7(b)(ii) 1 mark per bullet point to max 2 2


e.g.
• Reduce amplitude to only the range used
• … limited amplitudes mean fewer bits per sample
• Run-length-encoding
• … Where consecutive sounds are the same record the binary value of the
sound and number of times it repeats
• Record the changes instead of the actual sounds

© UCLES 2021 Page 8 of 9


MUHAMMAD ALI KHAN
PAGE 795
9618/11 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

8(a) 1 mark per bullet point 3

• LAN
• Small geographical area
• No leasing external infrastructure / transmission media // does not use
internet to transmit within the building

8(b) 1 mark per item 2

• router
• switch
• hub

8(c) 1 mark per bullet point to max 4 4

• Provide interface to wireless network


• … as an antenna
• Receives analogue radio waves
• … convert them to digital / binary
• Checks incoming transmissions for correct MAC / IP address
• … ignore transmissions not intended for it
• Encrypts / encodes the data
• Decrypts / decodes the data
• Takes digital/binary input and converts to analogue waves
• … sends the radio waves via the antenna

© UCLES 2021 Page 9 of 9


MUHAMMAD ALI KHAN
PAGE 796

Cambridge International AS & A Level


* 5 4 4 0 4 4 0 9 9 3 *

COMPUTER SCIENCE 9618/12


Paper 1 Theory Fundamentals October/November 2021
1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.

INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (RW/SG) 206391/2
© UCLES 2021 [Turn over
MUHAMMAD ALI KHAN
PAGE 797

1 When designing computer systems, it is important to consider the security, integrity and privacy of
the data.

Draw one line from each measure to indicate whether it keeps data secure or protects the integrity
of data.

Measure

Firewall

Double entry
Data Security

Presence check

Data Integrity
Access rights

Password

[2]

© UCLES 2021 9618/12/O/N/21


MUHAMMAD ALI KHAN
PAGE 798

2 (a) Complete the truth table for each of the following two logic gates.

A B Output

A 0 0

B 0 1

1 0

1 1

A B Output

A 0 0

B 0 1

1 0

1 1

[2]

(b) Draw a logic circuit for the following logic expression.

X = NOT(NOT(A AND B)AND C)

X
B

[2]

© UCLES 2021 9618/12/O/N/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 799

3 Andy likes to play computer games.

(a) Andy uses several input devices to play the games. These include a keyboard and a
microphone.

Describe the principal operation of a microphone.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Andy plays some of the computer games over the internet. He has several devices that
connect wirelessly to the router in his house.

(i) Identify the topology of Andy’s home network. Justify your choice.

Topology ............................................................................................................................

Justification .......................................................................................................................

...........................................................................................................................................
[2]

(ii) The router has a wireless access point (WAP) to allow the devices to connect wirelessly.

Identify three functions of the router in Andy’s network.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2021 9618/12/O/N/21


MUHAMMAD ALI KHAN
PAGE 800

BLANK PAGE

© UCLES 2021 9618/12/O/N/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 801

4 A register stores the following binary number:

1 1 0 0 1 1 0 1

(a) The binary value in the register represents an unsigned binary integer.

Convert the unsigned binary integer into denary.

............................................................................................................................................. [1]

(b) The binary value in the register represents a two’s complement binary integer.

Convert the two’s complement binary integer into denary.

............................................................................................................................................. [1]

(c) The binary value in the register represents a hexadecimal number.

Convert the binary number into hexadecimal.

............................................................................................................................................. [1]

(d) State why the value in the register cannot be interpreted as a Binary Coded Decimal (BCD).

...................................................................................................................................................

............................................................................................................................................. [1]

(e) The binary contents of two registers are:

Register 1 0 0 1 1 1 1 0 1

Register 2 0 0 1 0 1 1 0 1

(i) Add the contents of Register 1 and Register 2. Show your working.

Answer ..............................................................................................................................
[2]

© UCLES 2021 9618/12/O/N/21


MUHAMMAD ALI KHAN
PAGE 802

(ii) Subtract the contents of Register 2 from the contents of Register 1. Show your working.

Answer ..............................................................................................................................
[2]

© UCLES 2021 9618/12/O/N/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 803

5 Riya has created the following logo as a vector graphic.

(a) Complete the table by writing a description of each vector graphic term and give an example
for this logo.

Term Description Example from logo

Property

Drawing list

[4]

(b) Riya takes a photograph using a digital camera. The photograph is stored as a bitmap image.

(i) Describe two differences between a vector graphic and a bitmap image.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]
© UCLES 2021 9618/12/O/N/21
MUHAMMAD ALI KHAN
PAGE 804

(ii) Riya needs to email the photograph. She compresses the photograph before sending it
using an email.

Describe two lossy methods that Riya can use to compress the image.

Method 1 ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Method 2 ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

© UCLES 2021 9618/12/O/N/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 805

10

6 A shop sells plants to customers. The shop manager has a relational database to keep track of the
sales.

The database, PLANTSALES, has the following structure:

PLANT(PlantName, QuantityInStock, Cost)

CUSTOMER(CustomerID, FirstName, LastName, Address, Email)

PURCHASE(PurchaseID, CustomerID)

PURCHASE_ITEM(PurchaseID, PlantName, Quantity)

(a) The database is normalised.

(i) The table lists the following three stages of normalisation:

• The first stage is from a database that is not normalised (0NF) to First Normal Form
(1NF).
• The second stage is from 1NF to Second Normal Form (2NF).
• The third stage is from 2NF to Third Normal Form (3NF).

Tick (9) one box in each row to identify the appropriate stage for each task.

Normalisation stage
Task
0NF to 1NF 1NF to 2NF 2NF to 3NF

Remove any partial key dependencies

Remove any repeating groups of attributes

Remove any non-key dependencies

[2]

(ii) Draw an entity-relationship (E-R) diagram for the database PLANTSALES.

PLANT CUSTOMER

PURCHASE_ITEM PURCHASE

[3]
© UCLES 2021 9618/12/O/N/21
MUHAMMAD ALI KHAN
PAGE 806

11

(b) The shop manager uses a Database Management System (DBMS).

Describe the purpose and contents of the data dictionary in the DBMS.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(c) The shop manager uses both Data Definition Language (DDL) and Data Manipulation
Language (DML) statements to create and search the database.

(i) Complete the DML statements to return the total number of items purchased with the
purchase ID of 3011A.

SELECT SUM(..................................................)

FROM ..................................................

WHERE .................................................. = ..................................................;


[4]

(ii) Write DDL statements to include a field in the table PURCHASE to store the date of the
order.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

© UCLES 2021 9618/12/O/N/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 807

12

7 A computer has system software.

(a) The Operating System handles interrupts.

Tick (9) one box in each row to identify whether each event is an example of a hardware
interrupt or a software interrupt.

Event Hardware interrupt Software interrupt


Buffer full
Printer is out of paper
User has pressed a key on the keyboard
Division by zero
Power failure
Stack overflow
[3]

(b) Describe the file management tasks that an Operating System performs.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(c) Identify two utility programs that can be used to improve the performance of a computer and
state how they improve the performance.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]
© UCLES 2021 9618/12/O/N/21
MUHAMMAD ALI KHAN
PAGE 808

13

8 The Von Neumann model for a computer system uses registers.

(a) Describe the role of the following special purpose registers in the fetch-execute (F-E) cycle.

(i) Memory Address Register (MAR) .....................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Memory Data Register (MDR) ...........................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

(ii) Another special purpose register is the Index Register.

Identify one other special purpose register used in the Von Neumann model for a
computer system.

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2021 9618/12/O/N/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 809

14

(b) The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).

Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
LDD <address> Direct addressing. Load the contents of the location at the given address to
ACC
STO <address> Store the contents of ACC at the given address
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP <address> Compare the contents of ACC with the contents of <address>
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
IN Key in a character and store its ASCII value in ACC
OUT Output to the screen the character whose ASCII value is stored in ACC
END Return control to the operating system
XOR #n Bitwise XOR operation of the contents of ACC with the operand
XOR <address> Bitwise XOR operation of the contents of ACC with the contents of <address>
OR #n Bitwise OR operation of the contents of ACC with the operand
OR <address> Bitwise OR operation of the contents of ACC with the contents of <address>
AND #n Bitwise AND operation of the contents of ACC with the operand
AND <address> Bitwise AND operation of the contents of ACC with the contents of <address>
LSL #n Bits in ACC are shifted logically n places to the left. Zeros are introduced on
the right hand end
LSR #n Bits in ACC are shifted logically n places to the right. Zeros are introduced on
the left hand end
<address> can be an absolute or symbolic address
# denotes a denary number, e.g. #123

The current contents of main memory are shown:

Address Data
100 01010101
101 11110000
102 00001111
103 00000000
104 11111111

© UCLES 2021 9618/12/O/N/21


MUHAMMAD ALI KHAN
PAGE 810

15

(i) In the following table, each row shows the current contents of the ACC in binary and the
instruction that will be performed on those contents.

Complete the table by writing the new contents of the ACC after the execution of each
instruction.

Current contents of the ACC Instruction New contents of the ACC

01010101 XOR 101

11110000 AND 104

00001111 LSL #4

11111111 OR 102

[4]

(ii) The following table contains five assembly language instruction groups.

Write an appropriate assembly language instruction for each instruction group, using the
given instruction set. The first one has been completed for you.

Instruction Group Instruction

Data movement LDM #2

Input and output of data

Arithmetic operations

Unconditional and conditional instructions

Compare instructions

[4]

© UCLES 2021 9618/12/O/N/21 [Turn over


MUHAMMAD ALI KHAN
PAGE 811

16

(iii) The opcode LDM uses immediate addressing. The opcode LDD uses direct addressing.

Identify and describe one additional mode of addressing.

Mode of addressing ...........................................................................................................

Description ........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[2]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 9618/12/O/N/21


MUHAMMAD ALI KHAN
PAGE 812

Cambridge International AS & A Level

COMPUTER SCIENCE 9618/12


Paper 1 Theory Fundamentals October/November 2021
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2021 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 10 printed pages.

© UCLES 2021 [Turn over


MUHAMMAD ALI KHAN
PAGE 813
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2021

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2021 Page 2 of 10


MUHAMMAD ALI KHAN
PAGE 814
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

1 1 mark for 3 correct lines only from Data Security 2


1 mark for 2 correct lines only from Data Integrity

Firewall

Double entry Data Security

Presence check

Access rights Data Integrity

Password

Question Answer Marks

2(a) 1 mark for each completely correct truth table 2

NOR
A B Output

0 0 1

0 1 0

1 0 0

1 1 0

NAND
A B Output

0 0 1

0 1 1

1 0 1

1 1 0

© UCLES 2021 Page 3 of 10


MUHAMMAD ALI KHAN
PAGE 815
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

2(b) 1 mark for each correct bullet point 2

• NOT (A AND B) // A NAND B


• NOT the result AND C // the result NAND C

OR

Question Answer Marks

3(a) 1 mark for each bullet point to max 3 3

• The microphone has a diaphragm / ribbon


• The incoming sound waves cause vibrations of the diaphragm
• … causing a coil to move past a magnet // causing a magnet to move
past a coil (dynamic microphone) // changing the capacitance (condenser
microphone) // deforms the crystal (crystal microphone)
• An electrical signal is produced

3(b)(i) 1 mark for identification of star topology 2

1 mark for justification


Devices are connected directly to the router independently
// all devices are only connected to the router

3(b)(ii) 1 mark for each correct function to max 3 3

• To receive packets from devices or the Internet


• To forward / route packets to the destination
• To find the destination of the packet
• To assign / allocate private IP addresses to devices on LAN
• To store / update / maintain a routing table
• To find the most efficient path to the destination
• To maintain a table of MAC and IP addresses

© UCLES 2021 Page 4 of 10


MUHAMMAD ALI KHAN
PAGE 816
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

4(a) 205 1

4(b) – 51 1

4(c) CD 1

4(d) 1 mark for: 1

The denary value in each group of 4 bits is greater than 9


// the denary value in each nibble is greater than 9

4(e)(i) 1 mark for working, 1 mark for answer 2

0011 1101
+0010 1101
0110 1010
111 1 1

4(e)(ii) 1 mark for working, 1 mark for answer 2

0011 1101
+1101 0011 (two’s complement)
0001 0000
1111 111

Question Answer Marks

5(a) 1 mark for each description,1 mark for each valid example 4

Term Description Example from logo

data about the shapes e.g.


// defines one aspect of the black line // white fill // black fill
Property
appearance of the drawing //solid (line) // font of letter //
object colour of triangle

the list of shapes involved in e.g.


an image triangle // capital letter R //
Drawing
// a list that stores the rectangle // line
list
command/description required
to draw each object

© UCLES 2021 Page 5 of 10


MUHAMMAD ALI KHAN
PAGE 817
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

5(b)(i) 1 mark for each bullet point to max 2 for each difference 4

• Bitmap made up of pixels // bitmap is made of colours stored for


individual pixels
• Vector graphic store a set of instructions about how to draw the shape

• When bitmap is enlarged the pixels get bigger and it pixelates


• When vector is enlarged it is recalculated and does not pixelate

• Bitmap files are usually bigger than vector graphics files because of the
need to store data about each pixel
• Vector graphics have smaller file size because they contain just the
instructions to create the shapes

• Bitmap images can be compressed with significant reduction in file size


• Vector graphic images do not compress well because of little redundant
data

5(b)(ii) 1 mark for each bullet point to max 2 for each method 4

• Reduce bit depth


• ... reduces the number of bits per colour / pixel which means each pixel
has fewer bits

• Reduce colour palette // reduce number of colours


• ... fewer colours mean fewer bits needed to store each colour

• Reduce image resolution


• ... fewer pixels per unit measurement means less binary to store

Question Answer Marks

6(a)(i) 1 mark for 1 tick in the correct place 2


2 marks for all 3 ticks correct

Normalisation stage
Task
0NF to 1NF to 2NF to
1NF 2NF 3NF

Remove any partial key dependencies 9

Remove any repeating groups of attributes 9

Remove any non-key dependencies 9

© UCLES 2021 Page 6 of 10


MUHAMMAD ALI KHAN
PAGE 818
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

6(a)(ii) 1 mark for each correct relationship 3

PLANT CUSTOMER

PURCHASE_ITEM PURCHASE

6(b) 1 mark for description of purpose 3


• Stores metadata about the database

1 mark for each example of contents to max 2


e.g.
• field / attribute names
• table name
• validation rules
• data types
• primary keys // foreign keys
• relationships

6(c)(i) 1 mark for each correctly completed space 4

SELECT SUM(Quantity)
FROM PURCHASE_ITEM
WHERE PurchaseID = "3011A";

6(c)(ii) 1 mark per bullet point 3

• ALTER TABLE PURCHASE


• ADD OrderDate
• Suitable data type, e.g. DATE

ALTER TABLE PURCHASE


ADD OrderDate DATE;

© UCLES 2021 Page 7 of 10


MUHAMMAD ALI KHAN
PAGE 819
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

7(a) 1 mark per pair of rows (shaded & unshaded) 3

Event Hardware Software


Interrupt Interrupt

Buffer full 9
1
Printer is out of paper 9

User has pressed a key on the keyboard 9


1
Division by zero 9

Power failure 9
1
Stack overflow 9

7(b) 1 mark for each bullet point to max 4 4

• Storage space is divided into file allocation units


• Space is allocated to particular files
• Maintains / creates directory structures
• Specifies the logical method of file storage (e.g. FAT or NTFS)
• Provides file naming conventions
• Controls access // implements access rights // implements password
protection // Makes file sharing possible
• Specifies tasks that can be performed on a file (e.g. open, close, delete,
copy, create, move etc.)

7(c) 1 mark for identifying program 1 mark for description, max 2 per program 4
e.g.
• Defragmentation
• Less time is taken to access files because each one is contiguous so
there is less head movement

• Virus checker
• makes more RAM available for programs to run
• ... because it removes software that might be taking up memory /
replicating

• Disk repair / Disk contents analysis


• preventing bad sectors being used because it identifies / marks them
• reduces access times by optimising storage

• Disk/system clean up
• releases storage by removing unwanted / temporary files

© UCLES 2021 Page 8 of 10


MUHAMMAD ALI KHAN
PAGE 820
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

8(a)(i) 1 mark for each bullet point to max 2 for each register 4

MAR
• Stores the next address to be fetched
• ... held in the Program Counter (PC)
• The data at this address is then fetched

MDR
• Stores the data from the address pointed to by the MAR
• The data in it is copied to the Current Instruction Register (CIR)

8(a)(ii) 1 mark for a correct register 1


e.g.
Program Counter (PC)
Current Instruction Register (CIR)
Status register
Interrupt register

8(b)(i) 1 mark for each correct answer 4

Current contents of New contents of


Instruction
the ACC the ACC

01010101 XOR 101 1010 0101

11110000 AND 104 1111 0000

00001111 LSL #4 1111 0000

11111111 OR 102 1111 1111

8(b)(ii) 1 mark for each correct instruction 4

Instruction Group Instruction

Data movement LDM #2

Input and output of data IN / OUT

Arithmetic Operations INC ACC / INC IX

Unconditional and conditional instructions JPN 100 / JMP 100

Compare instructions CMP 100

© UCLES 2021 Page 9 of 10


MUHAMMAD ALI KHAN
PAGE 821
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2021

Question Answer Marks

8(b)(iii) 1 mark for name, 1 mark for description 2

• Indirect addressing
• the address to be used is at the given address

• Relative addressing
• the address to be used is an offset number of locations away, relative to
the address of the current instruction

• Indexed addressing
• form the address from the given address plus the contents of the index
register

© UCLES 2021 Page 10 of 10


MUHAMMAD ALI KHAN
PAGE 822

Cambridge International AS & A Level


* 7 9 3 8 3 8 5 7 9 2 *

COMPUTER SCIENCE 9618/11


Paper 1 Theory Fundamentals May/June 2022
1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.

INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (LK/CGW) 301923/2
© UCLES 2022 [Turn over
MUHAMMAD ALI KHAN
PAGE 823

1 Computers store data in binary form.

(a) State the difference between a tebibyte and a terabyte.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Convert the signed denary value –100 into an 8-bit two’s complement binary integer.

Working .....................................................................................................................................

...................................................................................................................................................

Answer ............................................................................ [1]

(c) Convert the denary number 251 into hexadecimal. Show your working.

Working .....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Answer ............................................................................
[2]

(d) Add the following unsigned binary integers.

01010000

+00111110

[1]

© UCLES 2022 9618/11/M/J/22


MUHAMMAD ALI KHAN
PAGE 824

2 A computer has hardware and software.

(a) The hardware includes different types of memory.

(i) Complete the description of computer memory.

Random Access Memory (RAM) and Read Only Memory (ROM) are both examples of

......................................................................... memory.

One item that is stored in RAM is ......................................................................... .

One item that is stored in ROM is ......................................................................... .

RAM can be either Static RAM (SRAM) or Dynamic RAM (DRAM).

SRAM uses transistors arranged as ......................................................................... .

DRAM uses transistors and ......................................................................... .


[5]

(ii) Explain the difference between Programmable ROM (PROM), Erasable Programmable
ROM (EPROM) and Electrically Erasable Programmable ROM (EEPROM).

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

© UCLES 2022 9618/11/M/J/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 825

(b) A magnetic hard disk is used to store data on the computer.

Describe the principal operations of a magnetic hard disk.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

© UCLES 2022 9618/11/M/J/22


MUHAMMAD ALI KHAN
PAGE 826

(c) Computers consist of logic gates.

(i) Complete the table by writing one set of values (input 1 and input 2) for each gate that
will give the output 1.

Gate Input 1 Input 2 Output

AND 1

NAND 1

XOR 1

NOR 1

[4]

(ii) Write the logic expression for the given logic circuit.

A
B

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2022 9618/11/M/J/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 827

3 A teacher is writing examination papers on a laptop computer. The computer is connected to the
internet. The teacher is concerned about the security and privacy of the papers.

(a) State the difference between the security of data and the privacy of data.

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Identify and describe two threats to the data. Identify one security measure to protect against
each threat. Each security measure must be different.

Threat 1 ....................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

Security measure ......................................................................................................................

Threat 2 ....................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

Security measure ......................................................................................................................


[6]

© UCLES 2022 9618/11/M/J/22


MUHAMMAD ALI KHAN
PAGE 828

4 A teacher uses a relational database, MARKS, to store data about students and their test marks.

The database has the following structure:

STUDENT(StudentID, FirstName, LastName)

TEST(TestID, Description, TotalMarks)

STUDENT_TEST(StudentID, TestID, Mark)

(a) Describe the advantages of using a relational database compared to a file-based approach.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Give the highest level of Normal Form (NF) the database MARKS is in and justify your choice.

Normal Form .............................................................................................................................

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2022 9618/11/M/J/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 829

(c) (i) Sample data to be stored in the table STUDENT_TEST is shown.

StudentID TestID Mark

12 A1 50

12 P10 100

13 A1 75

14 P10 60

Write a Structured Query Language (SQL) script to create the table STUDENT_TEST.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

(ii) Write a Structured Query Language (SQL) script to find the average mark of students in
test A7.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

© UCLES 2022 9618/11/M/J/22


MUHAMMAD ALI KHAN
PAGE 830

(d) The mark a student is awarded in a test will be entered into the database. This mark needs to
be a whole number between 0 and the maximum number of marks for that test (inclusive).

Explain how data validation and data verification can be used when a mark is entered.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2022 9618/11/M/J/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 831

10

5 A programmer uses an Integrated Development Environment (IDE) to develop a program.

(a) Draw one line from each IDE feature to its correct description.

IDE feature Description

Executes one line of the program and


Context-sensitive prompt
then stops

Underlines or highlights statements


Dynamic syntax check that do not meet the rules of the
language

Outputs the contents of variables and


Breakpoint
data structures

Single stepping Stops the code executing at a set line

Displays predictions of the code being


Report window
entered
[4]

(b) The programmer wants to allow users to edit, improve and redistribute the program.

Identify two different types of software licence that the programmer could use.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

© UCLES 2022 9618/11/M/J/22


MUHAMMAD ALI KHAN
PAGE 832

11

(c) Explain the benefits to the programmer of using program libraries.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2022 9618/11/M/J/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 833

12

6 (a) A computer system is designed using the basic Von Neumann model.

(i) Describe the role of the registers in the Fetch-Execute (F-E) cycle.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [5]

(ii) Describe when interrupts are detected in the F-E cycle and how the interrupts are
handled.

Detected ............................................................................................................................

...........................................................................................................................................

Handled .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[5]

© UCLES 2022 9618/11/M/J/22


MUHAMMAD ALI KHAN
PAGE 834

13

(b) Identify one factor that can affect the performance of the computer system and state how it
impacts the performance.

Factor .......................................................................................................................................

Impact .......................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

Question 6 continues on the next page.

© UCLES 2022 9618/11/M/J/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 835

14

(c) The table shows part of the instruction set for a processor. The processor has one general
purpose register, the Accumulator (ACC).

Instruction
Explanation
Opcode Operand
AND #n Bitwise AND operation of the contents of ACC with the operand
XOR #n Bitwise XOR operation of the contents of ACC with the operand
OR #n Bitwise OR operation of the contents of ACC with the operand
LSL #n Bits in ACC are shifted logically n places to the left. Zeros are
introduced on the right hand end
LSR #n Bits in ACC are shifted logically n places to the right. Zeros are
introduced on the left hand end
# denotes a denary number, e.g. #123

(i) Complete the register to show the result after the instruction AND #2 is executed.

Register before: 0 1 1 0 1 1 0 1

Register after:

[1]

(ii) Complete the register to show the result after the instruction OR #8 is executed.

Register before: 0 1 1 0 1 1 0 1

Register after:

[1]

© UCLES 2022 9618/11/M/J/22


MUHAMMAD ALI KHAN
PAGE 836

15

(iii) Complete the register to show the result after the operation LSL #4 is executed.

Register before: 0 1 1 0 1 1 0 1

Register after:

[1]

© UCLES 2022 9618/11/M/J/22


MUHAMMAD ALI KHAN
PAGE 837

Cambridge International AS & A Level

COMPUTER SCIENCE 9618/11


Paper 11 Theory Fundamentals May/June 2022
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2022 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.

This document consists of 8 printed pages.

© UCLES 2022 [Turn over


MUHAMMAD ALI KHAN
PAGE 838
9618/11 Cambridge International AS & A Level – Mark Scheme May/June 2022
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

x the specific content of the mark scheme or the generic level descriptors for the question
x the specific skills defined in the mark scheme or in the generic level descriptors for the question
x the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

x marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
x marks are awarded when candidates clearly demonstrate what they know and can do
x marks are not deducted for errors
x marks are not deducted for omissions
x answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2022 Page 2 of 8


MUHAMMAD ALI KHAN
PAGE 839
9618/11 Cambridge International AS & A Level – Mark Scheme May/June 2022
PUBLISHED

Question Answer Marks

1(a) 1 mark for: 1

one tebibyte is 1024 gibibytes and one terabyte is 1000 gigabytes

1(b) 1001 1100 1

1(c) 1 mark for working e.g. 2


x Dividing by 16 // converting to binary (11111011)

1 mark for answer


FB

1(d) 1000 1110 1

Question Answer Marks

2(a)(i) 1 mark for each correct term. 5

Random Access Memory (RAM) and Read Only Memory (ROM) are both
examples of primary memory.

One item that is stored in RAM is currently running software/data/part of


OS.

One item that is stored in ROM is the start-up/boot-up instructions/BIOS.

RAM can be either Static RAM (SRAM) or Dynamic RAM (DRAM).


SRAM uses transistors arranged as flip-flops/latches.
DRAM uses transistors and capacitors.

2(a)(ii) 1 mark per bullet point to max 3 3

x PROM can be set once, EPROM and EEPROM can be overwritten


multiple times.

x EPROM needs to be removed from device EEPROM can be erased in


situ.

x EPROM and can be erased using UV light, EEPROM can be erased


using voltage // is flash storage .

x EPROM must be entirely erased before rewriting, EEPROM does not


have to be entirely erased before rewriting.

© UCLES 2022 Page 3 of 8


MUHAMMAD ALI KHAN
PAGE 840
9618/11 Cambridge International AS & A Level – Mark Scheme May/June 2022
PUBLISHED

Question Answer Marks

2(b) 1 mark per bullet point to max 5 5

x The hard disk has (one or more) platter/plate/disk


x Each surface of the platter/disk is (ferrous oxide which is) capable of
being magnetised
x The platters/disks are mounted on a (central) spindle
x The entire mechanism is contained inside a sealed (aluminium) box.
x The disks are rotated (at high-speed)
x (Each surface of the disk) has a read/write head mounted on an arm
(positioned just above the surface)
x Electronic circuits control the movement of the arm (and hence the
heads)
x The surface of the platter/disk is divided into concentric tracks / circles
x The surface of the platter/disk is divided into sectors
x One track in one sector is the basic unit of storage called a block
x The data is encoded as a magnetic pattern for each block
x When writing to disk, a variation in the current in the head produces a
variation in magnetic field on the disk
x When reading from disk, a variation in magnetic field produces a
variation in current through the head

2(c)(i) 1 mark for each correct row. 4

Gate Input 1 Input 2

AND 1 1

0 0
NAND 0 1
1 0

0 1
XOR
1 0

NOR 0 0

2(c)(ii) 1 mark per bullet point 3

x A NAND B
x B XOR C
x OR

(A NAND B) OR (B XOR C)

© UCLES 2022 Page 4 of 8


MUHAMMAD ALI KHAN
PAGE 841
9618/11 Cambridge International AS & A Level – Mark Scheme May/June 2022
PUBLISHED

Question Answer Marks

3(a) Security prevents against loss while privacy prevents unauthorised access 1

3(b) 1 mark for identifying threat, 1 mark for description, 1 mark for security 6
measure (times 2)
e.g.
x Malware
x Malicious software that replicates and can delete/damage the
examination papers
x Install and run anti-malware

x Hacker/unauthorised access
x Illegal access in order to delete/damage the examination papers
x Use a firewall // strong passwords

x Spyware
x Software installed on the computer without the teacher’s knowledge
which records keystrokes and sends the data gathered about the
examination papers to a third party
x Use a firewall / install and run anti-spyware / use a virtual (onscreen)
keyboard

Question Answer Marks

4(a) 1 mark per bullet point to max 4 4

e.g.
x Reduced data redundancy // less repeated data
x …because each item of data is only stored once
x Maintains data consistency // improves data integrity
x …changes in one table will automatically update in another
x ... linked data cannot be entered differently in two tables
x Program-data independence
x …changes to the data do not require programs to be re-written
x Complex queries are easier to run
x Can provide different views
x ….so users can only see specific aspects of the database

4(b) 1 mark for 3NF 3

1 mark per bullet for justification to max 2


x There are no repeated attributes // it is already in 2NF
x Each field is fully dependent on the corresponding primary key // no
partial dependencies
x No transitive dependencies

© UCLES 2022 Page 5 of 8


MUHAMMAD ALI KHAN
PAGE 842
9618/11 Cambridge International AS & A Level – Mark Scheme May/June 2022
PUBLISHED

Question Answer Marks

4(c)(i) 1 mark per bullet point 5

x Create table, table name, opening and closing brackets


x StudentID and Mark as integer
x TestID as Varchar
x Primary key correctly set up
x Foreign keys correctly set up
e.g.
CREATE TABLE STUDENT_TEST (
StudentId INTEGER,
TestID VARCHAR,
Mark INTEGER,
PRIMARY KEY(StudentID,TestID),
FOREIGN KEY(TestID) REFERENCES TEST(TestID),
FOREIGN KEY(StudentID) REFERENCES STUDENT(StudentID)
);

4(c)(ii) 1 mark for each point 3

x AVG(Mark)
x SELECT and FROM STUDENT_TEST
x WHERE clause

e.g.
SELECT AVG(Mark)
FROM STUDENT_TEST
WHERE TestID = "A7";

4(d) 1 mark per bullet point to max 3 for validation 4

e.g.
x range check to make sure it is between 0 and max marks
x presence check to make sure a mark is entered
x type check to make sure an integer value is entered

1 mark per bullet point to max 2 for verification


e.g.
x double entry - enter the mark twice and the computer compares them
x visual check – manually compare the mark entered with the mark on the
input document

© UCLES 2022 Page 6 of 8


MUHAMMAD ALI KHAN
PAGE 843
9618/11 Cambridge International AS & A Level – Mark Scheme May/June 2022
PUBLISHED

Question Answer Marks

5(a) 1 mark for 1 correct line, 2 marks for 2 correct lines, 3 marks for 3 or 4 4
correct lines, 4 marks for all 5 correct lines

IDE feature Description

Context-sensitive Executes one line of the


prompt program and then stops

Underlines or highlights
Dynamic syntax
statements that do not meet
check
the rules of the language

Outputs the contents of


Breakpoint variables and data
structures

Stops the code executing at


Single stepping
a set line

Displays predictions of the


Report window
code being entered

5(b) 1 mark each: 2

x Open Source Initiative


x Free Software Foundation

5(c) 1 mark per bullet point to max 3 3

x Saves (programming/testing) time as code does not have to be


written/re-written from scratch // code does not have to be tested
x Code is already tested so it is more robust/likely to work
x If there is an improvement in the library routine the program updates
automatically
x can perform complex calculations that the programmer may be unable to
do

© UCLES 2022 Page 7 of 8


MUHAMMAD ALI KHAN
PAGE 844
9618/11 Cambridge International AS & A Level – Mark Scheme May/June 2022
PUBLISHED

Question Answer Marks

6(a)(i) 1 mark per bullet point to max 5 5

x The Program Counter (PC) holds the address of the next instruction …
x …and the contents are incremented / changed to the next address each
cycle
x The Memory Address Register (MAR) holds the address to fetch the data
(from the PC)
x The Memory Data Register (MDR) holds the data at the address in MAR
x The instruction is transferred to Current Instruction Register (CIR) for
decoding and execution

6(a)(ii) 1 mark for detection 5


x At the start/end of a FE cycle

1 mark for handling to max 4


x Priority is checked
x If lower priority than current process continue with F-E cycle
x If higher priority than current process …
x … state of current process is / registers are stored on stack
x Location / type of interrupt identified...
x …appropriate ISR is called to handle the interrupt
x When ISR finished, check for further interrupts (of high priority) / return to
step 1
x Otherwise load data from stack and continue with process

6(b) 1 mark for factor 1 mark for impact 2


e.g.
x Clock speed…
x …higher clock speed means more FE cycles per second

x Number of cores…
x …means more instructions can be carried out simultaneously
x Bus width …
x …allows the transfer of more data each time // allows more memory
locations to be directly accessed

x Cache …
x … the higher capacity the more frequently used instructions it can store
for fast access

6(c)(i) 0000 0000 1

6(c)(ii) 0110 1101 1

6(c)(iii) 1101 0000 1

© UCLES 2022 Page 8 of 8


MUHAMMAD ALI KHAN
PAGE 845

Cambridge International AS & A Level


* 4 7 0 8 7 1 2 3 9 8 *

COMPUTER SCIENCE 9618/12


Paper 1 Theory Fundamentals May/June 2022
1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.

INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (KN) 301924/3
© UCLES 2022 [Turn over
MUHAMMAD ALI KHAN
PAGE 846

1 (a) Draw one line from each image representation term to its correct definition.

Term Definition

The number of pixels wide by the number of


Pixel
pixels high

The smallest identifiable component of an


Bit depth
image

Stores data about the image file, e.g. file


Image resolution
format, number of bits per pixel, file size

The number of bits used to represent each


File header
colour

[3]

(b) The following section of a bitmap image is 10 pixels wide and 5 pixels high. In this example,
each colour is represented by a letter, e.g. B is blue.

B B B B B B B B B B

Y Y P Y Y Y P Y Y Y

R R M R P K T T R R

B O P Y Y Y P G P P

R O R P P P R R R R

The complete image can have up to 256 colours.

(i) Identify the smallest number of bits that can be used to represent each colour in the
complete bitmap image.

..................................................................................................................................... [1]

© UCLES 2022 9618/12/M/J/22


MUHAMMAD ALI KHAN
PAGE 847

(ii) Calculate an estimate for the file size of the section of the bitmap image shown, giving
your answer in bytes. Use your answer from part (b)(i).

Show your working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Answer ................................... bytes


[2]

(c) Describe how changing the colour depth of an image affects its file size.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(d) The first row of pixels in the image from part (b) is shown:

B B B B B B B B B B

Explain how this row of pixels can be compressed using lossless compression.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2022 9618/12/M/J/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 848

2 A car has several features.

(a) One feature is a lane detection system. This system monitors the lines on either side of the
lane. If the car gets too close to one line, the system automatically moves the car away from
the line.

Explain why the lane detection system is an example of an embedded system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Two other features:

• record the number of miles travelled in the current journey, from when the engine is
turned on to when it is turned off
• record the total number of miles the car has travelled since it was built.

Identify the data that will be stored in the primary and secondary storage of the car for these
two features.

Primary .....................................................................................................................................

...................................................................................................................................................

Secondary ................................................................................................................................

...................................................................................................................................................
[2]

(c) The car has a resistive touchscreen for the user to select options.

Tick () one box in each row to show whether each statement about a resistive touchscreen
is true or false.

Statement True False

The screen always has five different layers

A processor determines the horizontal and


vertical coordinates of the point of contact

The touchscreen will work if any object


touches the screen
[1]

© UCLES 2022 9618/12/M/J/22


MUHAMMAD ALI KHAN
PAGE 849

3 The table shows part of the instruction set for a processor. The processor has one general purpose
register, the Accumulator (ACC).

Instruction
Explanation
Opcode Operand
AND #n Bitwise AND operation of the contents of ACC with the operand
Bitwise AND operation of the contents of ACC with the contents
AND <address>
of <address>
XOR #n Bitwise XOR operation of the contents of ACC with the operand
Bitwise XOR operation of the contents of ACC with the contents
XOR <address>
of <address>
OR #n Bitwise OR operation of the contents of ACC with the operand
Bitwise OR operation of the contents of ACC with the contents of
OR <address>
<address>
<address> can be an absolute or a symbolic address
# denotes a denary number, e.g. #123

(a) The ACC currently contains the following positive binary integer:

0 1 1 0 0 1 0 1

Write the bit manipulation instruction that would change the binary integer in ACC to:

1 1 1 1 1 1 1 1

Opcode ..................................................... Operand .....................................................


[2]

(b) The ACC currently contains the following positive binary integer:

0 1 1 0 0 1 0 1

Write the bit manipulation instruction that would change the binary integer in ACC to:

1 0 0 1 1 0 1 0

Opcode ..................................................... Operand .....................................................


[2]

© UCLES 2022 9618/12/M/J/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 850

(c) Convert the following positive binary integer into hexadecimal.

01111110
............................................................................................................................................. [1]

(d) A three-place logical shift to the left is performed on the following positive binary integer.

Show the result of this logical shift.

01111110

............................................................................................................................................. [1]

(e) Convert the denary numbers 127 and 12 to 8-bit binary and then perform the subtraction
íLQELQDU\

Show your working.

127 in binary .............................................................................................................................

12 in binary ...............................................................................................................................

íLQELQDU\ .....................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2022 9618/12/M/J/22


MUHAMMAD ALI KHAN
PAGE 851

4 A school stores personal data about its staff and students on its computer system.

(a) Explain why the school needs to keep both its data and its computer system secure from
unauthorised access.

Data ..........................................................................................................................................

...................................................................................................................................................

Computer system .....................................................................................................................

...................................................................................................................................................
[2]

(b) Complete the table by identifying two security threats to the data on a computer.

Describe each threat.

Give a different prevention method for each threat.

Prevention
Threat Description
method

..................................................................................
.......................... .................................................................................. ..........................

.......................... .................................................................................. ..........................

..................................................................................

..................................................................................
.......................... .................................................................................. ..........................

.......................... .................................................................................. ..........................

..................................................................................

[6]

(c) Data is encrypted when it is transmitted within the school network, or externally such as over
the internet.

Describe what is meant by encryption and explain why it is used.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2022 9618/12/M/J/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 852

5 A database, FILMS, stores information about films and actors.

Part of the database is shown:

ACTOR(ActorID, FirstName, LastName, DateOfBirth)


FILM_FACT(FilmID, FilmTitle, ReleaseDate, Category)
FILM_ACTOR(ActorID, FilmID)

(a) Complete the entity-relationship (E-R) diagram.

ACTOR FILM_FACT

FILM_ACTOR

[2]

(b) A composite primary key consists of two or more attributes that together form the primary key.

Explain why the table FILM_ACTOR has a composite primary key.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2022 9618/12/M/J/22


MUHAMMAD ALI KHAN
PAGE 853

(c) Complete the SQL script to return the IDs of all the actors in the film with the title Cinderella.

SELECT .......................................................................................

FROM FILM_ACTOR

INNER JOIN ........................................................................................

ON FILM_FACT.FilmID = ..............................................................................

WHERE FILM_FACT.FilmTitle = .............................................................................. ;


[4]

(d) Write an SQL script to count the number of films that were released in January 2022.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2022 9618/12/M/J/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 854

10

(e) A Database Management System (DBMS) is used to create and manipulate the database.

Complete the descriptions of the features and tools found in a DBMS using the given terms.
Not all terms will be used.

Boolean data dictionary data redundancy field names

input interface logical schema normalisation

operating system output primary keys query

structure

A DBMS provides data management. This includes the development of a

....................................................... that stores information about the data stored, such as

....................................................... and ....................................................... .

The ....................................................... uses methods, such as an E-R diagram, to show the

structure of the database and its relationships.

The ....................................................... processor allows a user to perform searches to find

specific data. The DBMS also provides a developer ....................................................... that

allows the user to create tables, forms and reports.


[6]

© UCLES 2022 9618/12/M/J/22


MUHAMMAD ALI KHAN
PAGE 855

11

6 A programmer uses language translators when writing and testing a program.

(a) Describe the operation of a compiler.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Describe the operation of an interpreter.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) Explain how a programmer can make use of a typical Integrated Development Environment
(IDE) when writing and testing a program.

Writing .......................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Testing ......................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2022 9618/12/M/J/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 856

12

7 Complete the truth table for the following logic expression:

X = (A XOR B) AND NOT C

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[2]

8 Describe one application of Artificial Intelligence (AI).

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [3]

© UCLES 2022 9618/12/M/J/22


MUHAMMAD ALI KHAN
PAGE 857

13

9 (a) The following incomplete table contains four network devices and their descriptions.

Complete the table by writing the missing devices and missing descriptions.

Device Description

Receives and sends data between two networks operating on the


..........................
same protocol

.................................................................................................................
Wireless
Network
.................................................................................................................
Interface Card
(WNIC)
.................................................................................................................

Restores the digital signal so it can be transmitted over greater


..........................
distances

.................................................................................................................
Wireless Access
.................................................................................................................
Point (WAP)
.................................................................................................................

[4]

(b) Describe three differences between fibre-optic cables and copper cables.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2022 9618/12/M/J/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 858

14

(c) Ethernet uses Carrier Sense Multiple Access/Collision Detection (CSMA/CD).

Describe CSMA/CD.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2022 9618/12/M/J/22


MUHAMMAD ALI KHAN
PAGE 859
9618/12 Cambridge International AS & A Level – Mark Scheme May/June 2022
PUBLISHED

Question Answer Marks

1(a) 1 mark for 1 correct line 3


2 marks for 2 or 3 correct lines
3 marks for all 4 correct lines

Term Definition

The number of pixels


Pixel wide by the number of
pixels high

The smallest identifiable


Bit depth
component of an image

Stores data about the


image file, e.g. file
Image resolution
format, number of bits
per pixel, file size

The number of bits used


File header
to represent each colour

1(b)(i) 8 1

1(b)(ii) 1 mark for working 2


x 10 * 5 * 8 (bits) / 8 // = 50 (pixels) * 8 (bits) / 8

1 mark for answer


x 50 (bytes)

1(c) 1 mark per point 2

x Increasing the colour depth results in increased file size // Decreasing


the colour depth results in smaller file size

x Increasing the colour depth means more bits per pixel and hence more
data stored // Decreasing the colour depth means fewer bits per pixel
and hence less data stored

1(d) 1 mark per point 2

x Use run-length encoding // RLE


x Record the colour Blue, and the number of times it occurs 10

© UCLES 2022 Page 3 of 9


MUHAMMAD ALI KHAN
PAGE 860
9618/12 Cambridge International AS & A Level – Mark Scheme May/June 2022
PUBLISHED

Question Answer Marks

2(a) 1 mark per point to max 2 2

x The lane detection system is built into / integrated into the car

x The lane detection system only performs one task


x The lane detection system is not easily changed/updated by the car
owner

2(b) 1 mark for primary 2


x e.g. Miles travelled in the current journey, before the engine is turned off

1 mark for secondary


x e.g. Total miles travelled since the car was built // miles for most recent
journey after engine switched off

2(c) 1 mark for all correct ticks 1

Statement True False

The screen always has five different layers 9

A processor determines the horizontal and


9
vertical coordinates of the point of contact

The touchscreen will work if any object


9
touches the screen

Question Answer Marks

3(a) 1 mark for correct opcode and 1 mark for corresponding operand 2

OR #255 // OR #154 // XOR #154

e.g.
x OR...
x ... #255

3(b) 1 mark for correct opcode and 1 mark for corresponding operand 2

XOR #255

e.g.
x XOR...
x ... #255

3(c) 7E 1

3(d) 11110000 1

© UCLES 2022 Page 4 of 9


MUHAMMAD ALI KHAN
PAGE 861
9618/12 Cambridge International AS & A Level – Mark Scheme May/June 2022
PUBLISHED

Question Answer Marks

3(e) 1 mark per point 3

x Correct conversion to binary 01111111 (127) and 00001100 (12)


x Working e.g. turning 01111111 into two's complement 10000001
x Answer: 1000 1101

Question Answer Marks

4(a) 1 mark per point, max 1 for data and max 1 for computer system 2

Data
x Data needs protecting from someone amending / deleting or taking it

Computer System
x Computer system need protecting to stop people for example, installing
malware or damaging the system

4(b) 1 mark for each correct threat, matching description and prevention 6
e.g.

Threat Description Prevention method

Virus Malicious software that Anti-virus / Firewall /


replicates itself and can corrupt Anti-malware
data

Hacker Unauthorised access to the Firewall / strong or


computer with malicious intent biometric passwords / user
permissions

4(c) 1 mark per point to max 2 2

x Data is turned into cipher text // Data is encoded


x Used so that it cannot be understood if intercepted without the
decryption key

© UCLES 2022 Page 5 of 9


MUHAMMAD ALI KHAN
PAGE 862
9618/12 Cambridge International AS & A Level – Mark Scheme May/June 2022
PUBLISHED

Question Answer Marks

5(a) 1 mark for each correct relationship 2

ACTOR FILM_FACT

FILM_ACTOR

5(b) 1 mark per point 2

x Neither key uniquely identifies each tuple by itself


x One actor cannot appear in the same film twice so together they are
unique

5(c) 1 mark per correct entry 4

SELECT FILM_ACTOR.ActorID / ActorID


FROM FILM_ACTOR
INNER JOIN FILM_FACT
ON FILM_FACT.FilmID = FILM_ACTOR.FilmID
WHERE FILM_FACT.FilmTitle = "Cinderella" ;

5(d) 1 mark per point 3

x COUNT and correct fieldname


x SELECT and FROM statements, including the table name in FROM
x WHERE statement

e.g.
SELECT COUNT(FilmID)
FROM FILM_FACT
WHERE ReleaseDate >= #01/01/2022# AND ReleaseDate <=
#31/01/2022#;
// WHERE ReleaseDate BETWEEN #01/01/2022# AND
#31/01/2022#;
// WHERE ReleaseDate = “January 2022”;

© UCLES 2022 Page 6 of 9


MUHAMMAD ALI KHAN
PAGE 863
9618/12 Cambridge International AS & A Level – Mark Scheme May/June 2022
PUBLISHED

Question Answer Marks

5(e) 1 mark for each correctly completed term 6

x data dictionary
x field names // primary keys
x primary keys //field names
x logical schema
x query
x interface

A DBMS provides data management. This includes the development of a


data dictionary that stores information about the data stored, such as field
names and primary keys.
The logical schema uses methods such as an E-R diagram to show the
structure of the database and its relationships.
The query processor allows a user to perform searches to find specific data.
The DBMS also provides a developer interface that allows the user to
create tables, forms and reports.

Question Answer Marks

6(a) 1 mark per point to max 2 2


e.g.
x Attempts to translate the whole source code
x Creates a separate error report at the end of the translation process
x If translation successful / no errors creates an executable file

6(b) 1 mark per point to max 2 2


e.g.
x Reads each line then translates it and executes it
x Stops when an error is encountered // displays errors where it finds
them

6(c) 1 mark per point, max 2 for writing, max 2 for testing 4

Writing e.g.
x Enter code into an editor
x Pretty printing to identify key terms
x Context-sensitive prompts to help complete statements
x Expand and collapse code blocks
x Auto-complete to suggest what to type next
x Auto-formatting to indent code blocks
x Dynamic syntax checking

Testing e.g.
x Single stepping to run the code line by line
x Breakpoints to stop the code at set points to check values
x Report window to see how variables change

© UCLES 2022 Page 7 of 9


MUHAMMAD ALI KHAN
PAGE 864
9618/12 Cambridge International AS & A Level – Mark Scheme May/June 2022
PUBLISHED

Question Answer Marks

7 1 mark for first 4 rows, 1 mark for second 4 rows (shaded) 2

A B C Working space X

0 0 0 0

0 0 1 0

0 1 0 1

0 1 1 0

1 0 0 1

1 0 1 0

1 1 0 0

1 1 1 0

Question Answer Marks

8 1 mark for identification of an application 3


Max 2 marks for relevant description
e.g.
x Police identifying wanted people
x Uses image recognition
x ... to identify features/characteristics/items in an image

x Natural language interfaces


x Use speech recognition to identify words that are spoken
x ... and adapts to learn regional accents

x Self-driving cars
x Detects its position on the road and within the traffic
x Follows a route // Collision avoidance // Self-parking etc.

x Spoken Interfaces
x Use natural language processing
x ... to take a sentence and work out its meaning

x Game playing
x Models characters in a computer game
x ... to allow computer characters to react according to the player's
movements

© UCLES 2022 Page 8 of 9


MUHAMMAD ALI KHAN
PAGE 865
9618/12 Cambridge International AS & A Level – Mark Scheme May/June 2022
PUBLISHED

Question Answer Marks

9(a) 1 mark for each completed name or description 4

Device Description

Receives and sends data between two networks


Router
operating on the same protocol

Wireless
Hardware component that allows a device to connect to
Network
a wireless network // Provides a MAC address to the
Interface Card
device to identify it on the wireless network
(WNIC)

Restores the digital signal so it can be transmitted over


Repeater
greater distances

Wireless Hardware component that provides radio


Access Point communication from the central device to nodes on the
(WAP) network (and vice versa)

9(b) 1 mark for each difference 3


e.g.
x Fibre optic data is transmitted using light, copper cable through
electrical signals
x Fibre optic has higher bandwidth than copper cable // Fibre optic has
higher transmission rates than copper cable
x Fibre optic has smaller risk of (noise) interference than copper cable
x Fibre optic can be used over longer distances than copper cable before
repeaters are needed
x Fibre optic is much more difficult to hack into than copper cable
x Fibre optic is more prone to damage than copper cable

9(c) 1 mark per point to max 4 4

x A workstation / node (wishing to transmit) listens to the communication


channel
x …data is only sent when the channel is free // ... if channel is free data
is sent
x Because there is more than one computer connected to the same
transmission medium
x ... two workstations can start to transmit at the same time, causing a
collision
x If a collision happens, the workstations send a (jamming) signal / abort
transmission
x …and each waits a random amount of time before attempting to resend

© UCLES 2022 Page 9 of 9


MUHAMMAD ALI KHAN
PAGE 866

Cambridge International AS & A Level


* 9 3 7 1 4 3 4 8 3 7 *

COMPUTER SCIENCE 9618/11


Paper 1 Theory Fundamentals October/November 2022
1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.

INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.

This document has 20 pages. Any blank pages are indicated.

DC (CJ/CT) 302751/2
© UCLES 2022 [Turn over
MUHAMMAD ALI KHAN
PAGE 867

1 (a) (i) Convert the unsigned binary integer into denary.

00100111

Answer ........................................................................................................................ [1]

(ii) Convert the Binary Coded Decimal (BCD) into denary.

00100111

Answer ........................................................................................................................ [1]

(iii) Convert the 8-bit two’s complement binary integer into denary.

11100111

Answer ........................................................................................................................ [1]

(b) Perform the following binary subtraction. Show your working.

1 0 1 1 0 0 1 1
_ 0 1 1 1 0 1 0 1

[2]

© UCLES 2022 9618/11/O/N/22


MUHAMMAD ALI KHAN
PAGE 868

(c) Give one similarity and two differences between the ASCII and Unicode character sets.

Similarity ...................................................................................................................................

...................................................................................................................................................

Difference 1 ..............................................................................................................................

...................................................................................................................................................

Difference 2 ..............................................................................................................................

...................................................................................................................................................
[3]

(d) Sound samples are recorded and saved in a file.

(i) State what is meant by sampling rate.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Explain the effect of increasing the sampling resolution on the sound file.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2022 9618/11/O/N/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 869

2 Draw one line from each security feature to its most appropriate description.

Security feature Description

converts data to an
alternative form

firewall

redirects a user to a fake


website

pharming

verifies the authenticity of


data

anti-virus software

scans files on the hard drive


for malicious software

encryption

accepts or rejects incoming


and outgoing packets based
on criteria

[4]

© UCLES 2022 9618/11/O/N/22


MUHAMMAD ALI KHAN
PAGE 870

3 (a) Draw a logic circuit for the logic expression:

X = NOT ((NOT A AND NOT B) OR (NOT B AND NOT C))

B X

[2]

(b) Complete the truth table for the logic expression:

X = NOT ((NOT A AND NOT B) OR (NOT B AND NOT C))

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[2]

© UCLES 2022 9618/11/O/N/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 871

4 A photographer creates a relational database to store data about photographs taken at birthday
parties.

The database, PHOTOGRAPHS, stores details of the customer, the party, the photographs taken
and the cameras used.

The photographer has several cameras that are used for taking the photographs at the parties.

Each camera has a specific lens type (for example, XY32Z) and lighting type (for example, F1672).

Data about each photograph is stored in the database including the party at which it was taken,
the time it was taken and the camera used.

The database has these four tables:

CUSTOMER(CustomerID, FirstName, LastName, Telephone)

PARTY(PartyID, CustomerID, PartyDate, StartTime)

PHOTO_DATA(PhotoID, PartyID, TimeTaken, CameraID)

CAMERA_DATA(CameraID, LensType, LightingType)

(a) Complete the entity-relationship (E-R) diagram for the database PHOTOGRAPHS.

PARTY CUSTOMER

PHOTO_DATA CAMERA_DATA

[3]

© UCLES 2022 9618/11/O/N/22


MUHAMMAD ALI KHAN
PAGE 872

(b) The database is normalised and is in Third Normal Form (3NF).

Describe the characteristics of a database that is in Third Normal Form (3NF).

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(c) The table shows some sample data for the table PHOTO_DATA.

PhotoID PartyID TimeTaken CameraID

ST23-56 BD987 08:34 NIK-02

ST23-57 BD987 08:55 NIK-02

ST23-60 BC08 09:01 CAN-01

ST23-61 BC08 10:23 CAN-12

ST23-62 BC08 10:56 NIK-01

(i) State what is meant by a tuple. Give an example of a tuple from PHOTO_DATA.

Tuple .................................................................................................................................

...........................................................................................................................................

Example ............................................................................................................................

...........................................................................................................................................
[2]

(ii) Complete the Structured Query Language (SQL) script to display the total number of
photographs that have been taken using a camera with a camera ID starting with CAN.

SELECT ........................................................ (................................................................)

FROM .........................................................................................

WHERE CameraID LIKE .................................................................................. ;


[4]

© UCLES 2022 9618/11/O/N/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 873

(d) Write an SQL script to include two new fields in CAMERA_DATA to store the number of
photographs currently on the camera and the date the camera was last used.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2022 9618/11/O/N/22


MUHAMMAD ALI KHAN
PAGE 874

Question 5 begins on page 10.

© UCLES 2022 9618/11/O/N/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 875

10

5 (a) State what is meant by the stored program concept in the Von Neumann model of a
computer system.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) A Central Processing Unit (CPU) contains several special purpose registers and other
components.

(i) State the role of the following registers.

Program Counter (PC) ......................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Index Register (IX) ............................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Status Register (SR) .........................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

(ii) Tick (9) one box in each row to identify the system bus used by each CPU component.

CPU component Data bus Address bus Control bus

System clock

Memory Address Register (MAR)

[1]

(iii) Describe the purpose of the Control Unit (CU) in a CPU.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2022 9618/11/O/N/22


MUHAMMAD ALI KHAN
PAGE 876

11

(c) Describe the purpose of an interrupt in a computer system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(d) Identify two causes of a software interrupt.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2022 9618/11/O/N/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 877

12

6 The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).

Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
LDD <address> Direct addressing. Load the contents of the location at the given
address to ACC
LDX <address> Indexed addressing. Form the address from <address> + the
contents of the index register. Copy the contents of this calculated
address to ACC
LDR #n Immediate addressing. Load the number n to IX
STO <address> Store contents of ACC at the given address
ADD <address> Add the contents of the given address to the ACC
ADD #n Add the denary number n to the ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP #n Compare the contents of ACC with number n
JPE <address> Following a compare instruction, jump to <address> if the
compare was True
JPN <address> Following a compare instruction, jump to <address> if the
compare was False
OUT Output to the screen the character whose ASCII value is stored in
ACC
END Return control to the operating system
<address> can be an absolute or a symbolic address
# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001101

© UCLES 2022 9618/11/O/N/22


MUHAMMAD ALI KHAN
PAGE 878

13

(a) The current contents of main memory and selected values from the ASCII character set are
given.

(i) Trace the program currently in memory using the trace table.

Instruction Memory address


ACC IX Output
Address Instruction address 100 101 110 111 112
77 LDR #0
0 0 66 65 35
78 LDX 110
79 CMP #35
80 JPE 92
81 ADD 100
82 STO 101
83 LDM #1
84 ADD 100
85 STO 100
86 INC IX
87 LDX 110
88 CMP #35
89 JPN 81
90 LDD 100
91 ADD #48
92 OUT
93 END

100 0
101 0

110 66
111 65
112 35

ASCII
Character
value
49 1
50 2
51 3
52 4

65 A
66 B
67 C
68 D

[4]
© UCLES 2022 9618/11/O/N/22 [Turn over
MUHAMMAD ALI KHAN
PAGE 879

14

(ii) The following instructions are repeated for your reference.

Instruction
Explanation
Opcode Operand
LDD <address> Direct addressing. Load the contents of the location at the given
address to ACC
STO <address> Store contents of ACC at the given address

State the purpose of this part of an assembly language program.

LDD 100
STO 165
LDD 101
STO 100
LDD 165
STO 101
...........................................................................................................................................

...........................................................................................................................................
[1]

© UCLES 2022 9618/11/O/N/22


MUHAMMAD ALI KHAN
PAGE 880

15

Question 6(b) begins on page 16.

© UCLES 2022 9618/11/O/N/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 881

16

(b) The following table shows another part of the instruction set for the processor.

Instruction
Explanation
Opcode Operand
AND #n Bitwise AND operation of the contents of ACC with the operand
AND Bn Bitwise AND operation of the contents of ACC with the binary number n
XOR #n Bitwise XOR operation of the contents of ACC with the operand
XOR Bn Bitwise XOR operation of the contents of ACC with the binary number n
OR #n Bitwise OR operation of the contents of ACC with the operand
OR Bn Bitwise OR operation of the contents of ACC with the binary number n
LSR #n Bits in ACC are shifted logically n places to the right. Zeros are
introduced on the left-hand end
<address> can be an absolute or a symbolic address
# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001101

(i) The current contents of the ACC are:

1 0 0 1 0 0 1 1

Show the result after the execution of the following instruction.

XOR B00011111
...........................................................................................................................................

...........................................................................................................................................

[1]

(ii) The current contents of the ACC are:

1 0 0 1 0 0 1 1

Show the result after the execution of the following instruction.

AND B11110000
...........................................................................................................................................

...........................................................................................................................................

[1]
© UCLES 2022 9618/11/O/N/22
MUHAMMAD ALI KHAN
PAGE 882

17

(iii) The current contents of the ACC are:

1 0 0 1 0 0 1 1

Show the result after the execution of the following instruction.

OR B11001100
...........................................................................................................................................

...........................................................................................................................................

[1]
(iv) The current contents of the ACC are:

1 0 0 1 0 0 1 1

Show the result after the execution of the following instruction.

LSR #2
...........................................................................................................................................

...........................................................................................................................................

[1]

(c) Tick () one or more boxes in each row to indicate whether the task is performed in the first
pass or the second pass of a two-pass assembler.

Task First pass Second pass

Remove comments.

Read the assembly language program one line at a time.

Generate the object code.

Check the opcode is in the instruction set.

[2]

© UCLES 2022 9618/11/O/N/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 883

18

7 (a) State two benefits to a programmer of using Dynamic Link Library (DLL) files.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Memory management is one of the tasks performed by an Operating System (OS).

Describe the ways in which memory management organises and allocates Random Access
Memory (RAM).

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) An Operating System may include a utility program to compress text files.

Describe one appropriate method of compressing a text file.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(d) Explain the reasons why increasing the amount of cache memory can improve the
performance of a CPU.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(e) State the name of a peripheral device port that provides a physical connection in the computer
for each of these peripherals.

3D printer ..................................................................................................................................

Monitor ......................................................................................................................................
[2]
© UCLES 2022 9618/11/O/N/22
MUHAMMAD ALI KHAN
PAGE 884

19

8 A Local Area Network (LAN) uses a bus topology.

Describe how Carrier Sense Multiple Access / Collision Detection (CSMA / CD) is used in a bus
network.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

9 Many modern televisions are examples of embedded systems.

(a) Explain why these televisions are embedded systems.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Embedded systems use Electrically Erasable Programmable ROM (EEPROM).

Describe one benefit of using EEPROMs in an embedded system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2022 9618/11/O/N/22


MUHAMMAD ALI KHAN
PAGE 885
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

1(a) 1 mark for each correct line. 5

Utility software Purpose

to reorganise files so
virus checker they are contiguous

to scan for malicious


program code
disk formatter

to decrease the file size

backup

to initialise a disk

disk repair to create copies of files


in case the original is
lost

to check for and fix


defragmentation inconsistencies on a
disk

1(b)(i) 1 mark for each bullet point (max 2): 2


x larger amounts of source code take time to compile
x slower to produce the object code than an interpreter
x code cannot be changed without recompilation
x the program will not run if there are any errors
x errors cannot be corrected in real-time
x one error may result in other false errors being reported
x cannot easily test specific sections of the source code // cannot easily test
unfinished source code

1(b)(ii) 1 mark for each bullet point (max 2): 2


x partially compiled programs can be used on different platforms as they
are interpreted when run
x code is optimised for the CPU as machine code is generated at run time

Question Answer Marks

2(a)(i) –106 1

2(a)(ii) 96 1

© UCLES 2022 Page 3 of 10


MUHAMMAD ALI KHAN
PAGE 886
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

2(a)(iii) 1 mark for each bullet point: 2


x 149 decimal
x 0001 0100 1001

2(b) 1101 0010 1

Question Answer Marks

3(a) 1 mark for T AND NOT W 3


1 mark for NOT R OR NOT M
1 mark for final AND

3(b) 1 mark for each set of rows as highlighted: 2

A B C X

0 0 0 1

0 0 1 0

0 1 0 0

0 1 1 0

1 0 0 0

1 0 1 0

1 1 0 0

1 1 1 0

3(c) 1 mark for each bullet point: 2


x to store data that does not change
x data must be stored even when device is without power
x to store boot up instructions / system software / firmware / BIOS

© UCLES 2022 Page 4 of 10


MUHAMMAD ALI KHAN
PAGE 887
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

4(a) data verification is checking if input data is the same as the original whereas 1
data validation is checking that the data is reasonable / sensible

4(b) 1 mark for each bullet point (max 3): 3


x checksum value is calculated from the data before transmission //
correct description of a checksum algorithm
x ... this calculated value is transmitted with the data
x receiving computer recalculates the checksum from the received data
x if the checksum received and calculated match, no error has occurred //
if the checksum received and calculated do not match, an error has
occurred

4(c) 1 mark for each bullet point (max 2). 2


For example:
x to make sure data is in the required format // only expected characters
allowed
x to make sure the data is already present in the system
x to make sure the data contains the correct number of characters
x to ensure that non-numeric data is entered

Question Answer Marks

5(a) 1 mark for each bullet point (max 3): 3

Solution 1:
x removing the many-to-many relationship between Owner and Tree
x ... by removing TreeID and TreePosition from the Owner table
x ... and creating a linking table between Owner and Tree
x ... that contains OwnerID, TreeID and TreePosition
x ... (composite) primary key of the linking table should be OwnerID and
TreeID // insert a named new primary key in the linking table

Solution 2:
x removing the many-to-many relationship between Owner and Tree
x move TreePosition into TREE table
x ... put OwnerID into TREE table
x create a new table with suitable name (for the species of tree)
x ... containing ScientificName, MaxHeight and FastGrowing
x ... with ScientificName as primary key // or another suitable primary key

© UCLES 2022 Page 5 of 10


MUHAMMAD ALI KHAN
PAGE 888
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

5(b) 1 mark for each bullet point: 3

x INSERT INTO TREE


x VALUES ( ) and correct values
x Values in correct order

Option 1:
INSERT INTO
TREE(TreeID, ScientificName, MaxHeight, FastGrowing)
VALUES('LOW_1276', 'Salix_Alba', 30.00, TRUE);

Option 2:
INSERT INTO
TREE
VALUES('LOW_1276', 'Salix_Alba', 30.00, TRUE);

5(c) 1 mark for: 1

An attribute / field (or set of attributes / fields) that could be a primary key

5(d)(i) 1 mark for description 2


x stores metadata about the database

1 mark for a correct example


For example:
x field / attribute names
x table name
x validation rules
x data types
x primary keys // foreign keys
x relationships

5(d)(ii) 1 mark for each bullet point (max 2): 2


x the overview of a database structure
x models the problem / situation
x ... by using methods such as an ER diagram
x independent of any particular DBMS

Question Answer Marks

6(a)(i) 1 mark for each method of ensuring authenticity (max 2): 2

x (email) message put through hashing algorithm to produce a digest


x Digest encrypted with sender’s private key (to create the digital signature)
x the (digital) signature can only be decrypted with matching sender’s
public key

© UCLES 2022 Page 6 of 10


MUHAMMAD ALI KHAN
PAGE 889
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

6(a)(ii) 1 mark for each bullet point: 3


x monitors incoming and outgoing packets / traffic
x checks against an allow list / deny list of IP addresses // checks against
a set of rules for acceptable data / ports etc.
x blocks transmissions that do not meet criteria / rules // allows through is
satisfies the criteria /rules

6(b)(i) 1 mark for each bullet point (max 2): 2


x improves the accuracy of the sound file
x ... because (digital) waveform more closely resembles the analogue
waveform
x quantization errors are reduced
x increases the amount of detail stored

6(b)(ii) 1 mark for each bullet point: 2


x decreases the file size of the sound file
x ... because fewer bits are used to store each sample

© UCLES 2022 Page 7 of 10


MUHAMMAD ALI KHAN
PAGE 890
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

7(a) 1 mark for each set of highlighted rows. 5

Instruction Memory address


ACC IX
address 100 101 102 103 110 111 112
0 0 112 4 1 4 0
75 0
76 1
77
78
79
80
84 2
85 2
86 0
87 1
88 1
89 1
90
76 4
77
78
79
80
81 6
82 6
83
86 1
87 2
88 2
89 2
90

7(b)(i) 0100 1100 1

© UCLES 2022 Page 8 of 10


MUHAMMAD ALI KHAN
PAGE 891
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

7(b)(ii) 0100 0001 1

7(b)(iii) 1001 1000 1

7(b)(iv) 1101 1111 1

7(c) 1 mark for each correct row: 3

Description Register transfer notation

Copy the address of the next instruction into


MAR Å [PC]
the Memory Address Register.

Increment the Program Counter. PC Å [PC] + 1

Copy the contents of the Memory Data


CIR Å [MDR]
Register into the Current Instruction Register.

Question Answer Marks

8(a) 1 mark one or two correct row(s). 2 marks for all three correct rows. 2

Increases Decreases No change to


Action
the file size the file size the file size

Change the colour depth of


the image file to 16 bits per 9
pixel.

Change the screen resolution


9
to 1366 u 768 pixels.

Change the colour of the


9
rectangle from black to red.

8(b) 1 mark for each bullet point (max 2). 2


For example:
x can be enlarged without pixelation / loss of quality
x individual components of the image can be edited
x generally a smaller file size

8(c)(i) 1 mark for each correct underlined part: 2

Uncompressed sound RLE compressed sound

EA F1 F1 F2 F2 F2 EA 1EA 2F1 3F2 1EA

AB AB FF FF 1D 67 2AB 2FF 11D 167

32 32 80 81 81 232 180 281

© UCLES 2022 Page 9 of 10


MUHAMMAD ALI KHAN
PAGE 892
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

8(c)(ii) 1 mark for each bullet point: 2


x all the data is required // no data can be lost
x ... otherwise text file will be corrupted / not make sense

Question Answer Marks

9 1 mark for each bullet point (max 2). 2


For example:
x incorrect recognition of faces leads to mistakes such as
x ... access to facilities / systems may be denied
x privacy issues / people do not like data being stored
x individuals will feel safer
x ... there might be a reduction in crime
x faster boarding
x catching criminals

Question Answer Marks

10(a) all four computers directly connected to the switch and no other connections. 1

10(b)(i) 1 mark for the device. 1 mark for corresponding reason. 2

x Device: Server
x Reason: Server processes the requests and authorises traffic // firewall
software on the server authorises traffic // server acts as the proxy

x Device: Switch
x Reason: Switch is connected to all the computers // to share access to
the router on the network

10(b)(ii) 1 mark for each bullet point (max 3): 3

x receive packets from devices / internet


x find destination of packets using the IP address
x forward packets to the destination
x assign private IP addresses to devices on LAN
x store/update/maintain a routing table
x find most efficient path to destination
x maintain table of MAC and IP addresses
x provides the LAN with a public IP address
x acts as a gateway
x performs protocol conversion
x acts as a firewall

© UCLES 2022 Page 10 of 10


MUHAMMAD ALI KHAN
PAGE 893

Cambridge International AS & A Level


* 9 8 0 9 7 6 1 1 9 7 *

COMPUTER SCIENCE 9618/12


Paper 1 Theory Fundamentals October/November 2022
1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.

INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.

This document has 20 pages. Any blank pages are indicated.

DC (PQ/CT) 302752/1
© UCLES 2022 [Turn over
MUHAMMAD ALI KHAN
PAGE 894

1 (a) Draw one line from each utility software to its most appropriate purpose.

Utility software Purpose

to reorganise files so
they are contiguous
virus checker
to scan for malicious
program code
disk formatter

to decrease the file size

backup

to initialise a disk

disk repair
to create copies of files
in case the original is lost
defragmentation
to check for and fix
inconsistencies on a disk

[5]

(b) Compilers and interpreters translate programs written in a high-level language into a low-level
language.

(i) State two drawbacks of using a compiler compared to an interpreter during program
development.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[2]

(ii) Explain why high-level language programs might be partially compiled and partially interpreted.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]
© UCLES 2022 9618/12/O/N/22
MUHAMMAD ALI KHAN
PAGE 895

2 (a) (i) Convert the two’s complement binary integer into denary.

10010110

Answer ....................................................... [1]

(ii) Convert the unsigned binary integer into hexadecimal.

10010110

Answer ....................................................... [1]

(iii) Convert the unsigned binary integer into Binary Coded Decimal (BCD). Show your
working.

10010101
Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Answer .......................................................
[2]

(b) Perform the following binary addition.

1 0 0 0 1 1 0 0
+ 0 1 0 0 0 1 1 0
[1]

© UCLES 2022 9618/12/O/N/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 896

3 (a) A greenhouse has an automatic window.

The window (X) operates according to the following criteria:

Parameter Description of parameter Binary value Condition

1 Too high
T Temperature
0 Acceptable

1 Too high
W Wind speed
0 Acceptable

1 Detected
R Rain
0 Not detected

1 On
M Manual override
0 Off

The window opens (X = 1) if:

• the temperature is too high and the wind speed is acceptable


• and
• rain is not detected, or the manual override is off.

Draw a logic circuit to represent the operation of the window.

[3]

© UCLES 2022 9618/12/O/N/22


MUHAMMAD ALI KHAN
PAGE 897

(b) Complete the truth table for the logic expression:

X = NOT (A OR B OR C) AND (B NOR C)

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1

[2]

(c) Embedded systems contain Read Only Memory (ROM) and Random Access Memory (RAM).

Explain the reasons why ROM is used in an embedded system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2022 9618/12/O/N/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 898

4 (a) State the difference between data verification and data validation.

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [1]

(b) A checksum can be used to detect errors during data transmission.

Describe how a checksum is used.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(c) One validation method is a presence check.

Describe two other validation methods that can be used to validate non-numeric data.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2022 9618/12/O/N/22


MUHAMMAD ALI KHAN
PAGE 899

5 A relational database, GARDEN, has the following tables:

OWNER(OwnerID, FirstName, TelephoneNo, TreeID, TreePosition)

TREE(TreeID, ScientificName, MaxHeight, FastGrowing)

(a) The database is not in Third Normal Form (3NF).

Explain how the database can be normalised to 3NF.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Write the Structured Query Language (SQL) script to add a new record in the table TREE to
store the following data:

Attribute Value

TreeID LOW_1276

ScientificName Salix_Alba

MaxHeight 30.00

FastGrowing TRUE

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(c) State what is meant by a candidate key in a relational database.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2022 9618/12/O/N/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 900

(d) (i) Describe, using an example, what is meant by a data dictionary.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Describe what is meant by a logical schema.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2022 9618/12/O/N/22


MUHAMMAD ALI KHAN
PAGE 901

6 (a) A student uses a networked laptop computer to send an email to a colleague.

(i) Explain how a digital signature ensures the email is authentic.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Describe how a firewall protects the data on the computer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(b) The student records a sound file.

(i) Explain the effect of increasing the sampling rate on the accuracy of the sound recording.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Explain the effect of decreasing the sampling resolution on the file size of the sound
recording.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2022 9618/12/O/N/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 902

10

7 The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).

Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
LDD <address> Direct addressing. Load the contents of the location at the given address to
ACC
LDX <address> Indexed addressing. Form the address from <address> + the contents of the
index register. Copy the contents of this calculated address to ACC
LDR #n Immediate addressing. Load the number n to IX
STO <address> Store the contents of ACC at the given address
ADD <address> Add the contents of the given address to the ACC
ADD #n Add the denary number n to the ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
JMP <address> Jump to the given address
CMP <address> Compare the contents of ACC with the contents of <address>
CMI <address> Indirect addressing. The address to be used is at the given address. Compare
the contents of ACC with the contents of this second address
JPE <address> Following a compare instruction, jump to <address> if the compare was True
JPN <address> Following a compare instruction, jump to <address> if the compare was False
END Return control to the operating system
<address> can be an absolute or symbolic address
# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001101

© UCLES 2022 9618/12/O/N/22


MUHAMMAD ALI KHAN
PAGE 903

11

(a) Trace the program currently in memory using the trace table, stopping when line 90 is
executed for a second time.

Address Instruction Instruction Memory address


ACC IX
address 100 101 102 103 110 111 112
75 LDR #0
0 0 112 4 1 4 0
76 LDX 110

77 CMI 102

78 JPE 91

79 CMP 103

80 JPN 84

81 ADD 101

82 STO 101

83 JMP 86

84 INC ACC

85 STO 101

86 LDD 100

87 INC ACC

88 STO 100

89 INC IX

90 JMP 76

91 END

100 0

101 0

102 112

103 4

110 1

111 4

112 0

[5]

© UCLES 2022 9618/12/O/N/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 904

12

(b) The following table shows another part of the instruction set for the processor.

Instruction
Explanation
Opcode Operand
AND #n Bitwise AND operation of the contents of ACC with the operand
AND <address> Bitwise AND operation of the contents of ACC with the contents of <address>
XOR #n Bitwise XOR operation of the contents of ACC with the operand
XOR Bn Bitwise XOR operation of the contents of ACC with the binary number n
XOR <address> Bitwise XOR operation of the contents of ACC with the contents of <address>
OR #n Bitwise OR operation of the contents of ACC with the operand
OR <address> Bitwise OR operation of the contents of ACC with the contents of <address>
LSL #n Bits in ACC are shifted logically n places to the left. Zeros are introduced on
the right-hand end
LSR #n Bits in ACC are shifted logically n places to the right. Zeros are introduced on
the left-hand end
<address> can be an absolute or symbolic address
# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001101

The contents of memory addresses 50 and 51 are shown:

Memory address Data value

50 01001101

51 10001111

(i) The current contents of the ACC are:

0 1 0 1 0 0 1 1

Show the contents of the ACC after the execution of the following instruction.

XOR B00011111

...........................................................................................................................................

...........................................................................................................................................

[1]

© UCLES 2022 9618/12/O/N/22


MUHAMMAD ALI KHAN
PAGE 905

13

(ii) The current contents of the ACC are:

0 1 0 1 0 0 1 1

Show the contents of the ACC after the execution of the following instruction.

AND 50

...........................................................................................................................................

...........................................................................................................................................

[1]

(iii) The current contents of the ACC are:

0 1 0 1 0 0 1 1

Show the contents of the ACC after the execution of the following instruction.

LSL #3

...........................................................................................................................................

...........................................................................................................................................

[1]

(iv) The current contents of the ACC are:

0 1 0 1 0 0 1 1

Show the contents of the ACC after the execution of the following instruction.

OR 51
...........................................................................................................................................

...........................................................................................................................................

[1]

© UCLES 2022 9618/12/O/N/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 906

14

(c) Write the register transfer notation for each of the stages in the fetch-execute cycle described
in the table.

Description Register transfer notation


Copy the address of the next instruction into
the Memory Address Register.

Increment the Program Counter.

Copy the contents of the Memory Data


Register into the Current Instruction Register.
[3]

© UCLES 2022 9618/12/O/N/22


MUHAMMAD ALI KHAN
PAGE 907

15

8 The following bitmap image has a resolution of 4096 × 4096 pixels and a colour depth of 24 bits
per pixel.

The image is displayed on a monitor that has a screen resolution of 1920 × 1080 pixels.

(a) Tick () one box in each row to identify the effect of each action on the image file size.

Increases the Decreases the No change to


Action
file size file size the file size
Change the colour depth of the
image file to 16 bits per pixel.
Change the screen resolution
to 1366 × 768 pixels.
Change the colour of the
rectangle from black to red.
[2]

(b) State two benefits of creating a vector graphic instead of a bitmap image.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2022 9618/12/O/N/22 [Turn over


MUHAMMAD ALI KHAN
PAGE 908

16

(c) A second bitmap image is stored using a colour depth of 8 bits per pixel.

The file is compressed using run-length encoding (RLE).

(i) The table shows the compressed and uncompressed values for parts of the image file.

Each colour of the pixel in the image is represented by a hexadecimal value.

Complete the table. The first row has been completed for you.

Uncompressed image RLE compressed image

EA F1 F1 F2 F2 F2 EA 1EA 2F1 3F2 1EA

2AB 2FF 11D 167

32 32 80 81 81

[2]

(ii) RLE is an example of lossless compression.

Explain why lossless compression is more appropriate than lossy compression for a
text file.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

9 One use of Artificial Intelligence (AI) is for facial recognition software.

Describe the social impact of using facial recognition software to identify individuals in an airport.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [2]

© UCLES 2022 9618/12/O/N/22


MUHAMMAD ALI KHAN
PAGE 909

17

10 A Local Area Network (LAN) consists of four computers, one server and a switch.

The LAN uses a star topology.

(a) Complete the following diagram to show how the hardware is connected.

Switch

Computer Computer Server Computer Computer

[1]

(b) A router is attached to one of the devices on the LAN shown in part (a) to connect the LAN to
the internet.

(i) Identify the device. Give a reason for your choice.

Device ...............................................................................................................................

Reason ..............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[2]

(ii) Describe the role and function of the router in the network.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

© UCLES 2022 9618/12/O/N/22


MUHAMMAD ALI KHAN
PAGE 910
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

1(a) 1 mark for each correct line. 5

Utility software Purpose

to reorganise files so
virus checker they are contiguous

to scan for malicious


program code
disk formatter

to decrease the file size

backup

to initialise a disk

disk repair to create copies of files


in case the original is
lost

to check for and fix


defragmentation inconsistencies on a
disk

1(b)(i) 1 mark for each bullet point (max 2): 2


x larger amounts of source code take time to compile
x slower to produce the object code than an interpreter
x code cannot be changed without recompilation
x the program will not run if there are any errors
x errors cannot be corrected in real-time
x one error may result in other false errors being reported
x cannot easily test specific sections of the source code // cannot easily test
unfinished source code

1(b)(ii) 1 mark for each bullet point (max 2): 2


x partially compiled programs can be used on different platforms as they
are interpreted when run
x code is optimised for the CPU as machine code is generated at run time

Question Answer Marks

2(a)(i) –106 1

2(a)(ii) 96 1

© UCLES 2022 Page 3 of 10


MUHAMMAD ALI KHAN
PAGE 911
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

2(a)(iii) 1 mark for each bullet point: 2


x 149 decimal
x 0001 0100 1001

2(b) 1101 0010 1

Question Answer Marks

3(a) 1 mark for T AND NOT W 3


1 mark for NOT R OR NOT M
1 mark for final AND

3(b) 1 mark for each set of rows as highlighted: 2

A B C X

0 0 0 1

0 0 1 0

0 1 0 0

0 1 1 0

1 0 0 0

1 0 1 0

1 1 0 0

1 1 1 0

3(c) 1 mark for each bullet point: 2


x to store data that does not change
x data must be stored even when device is without power
x to store boot up instructions / system software / firmware / BIOS

© UCLES 2022 Page 4 of 10


MUHAMMAD ALI KHAN
PAGE 912
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

4(a) data verification is checking if input data is the same as the original whereas 1
data validation is checking that the data is reasonable / sensible

4(b) 1 mark for each bullet point (max 3): 3


x checksum value is calculated from the data before transmission //
correct description of a checksum algorithm
x ... this calculated value is transmitted with the data
x receiving computer recalculates the checksum from the received data
x if the checksum received and calculated match, no error has occurred //
if the checksum received and calculated do not match, an error has
occurred

4(c) 1 mark for each bullet point (max 2). 2


For example:
x to make sure data is in the required format // only expected characters
allowed
x to make sure the data is already present in the system
x to make sure the data contains the correct number of characters
x to ensure that non-numeric data is entered

Question Answer Marks

5(a) 1 mark for each bullet point (max 3): 3

Solution 1:
x removing the many-to-many relationship between Owner and Tree
x ... by removing TreeID and TreePosition from the Owner table
x ... and creating a linking table between Owner and Tree
x ... that contains OwnerID, TreeID and TreePosition
x ... (composite) primary key of the linking table should be OwnerID and
TreeID // insert a named new primary key in the linking table

Solution 2:
x removing the many-to-many relationship between Owner and Tree
x move TreePosition into TREE table
x ... put OwnerID into TREE table
x create a new table with suitable name (for the species of tree)
x ... containing ScientificName, MaxHeight and FastGrowing
x ... with ScientificName as primary key // or another suitable primary key

© UCLES 2022 Page 5 of 10


MUHAMMAD ALI KHAN
PAGE 913
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

5(b) 1 mark for each bullet point: 3

x INSERT INTO TREE


x VALUES ( ) and correct values
x Values in correct order

Option 1:
INSERT INTO
TREE(TreeID, ScientificName, MaxHeight, FastGrowing)
VALUES('LOW_1276', 'Salix_Alba', 30.00, TRUE);

Option 2:
INSERT INTO
TREE
VALUES('LOW_1276', 'Salix_Alba', 30.00, TRUE);

5(c) 1 mark for: 1

An attribute / field (or set of attributes / fields) that could be a primary key

5(d)(i) 1 mark for description 2


x stores metadata about the database

1 mark for a correct example


For example:
x field / attribute names
x table name
x validation rules
x data types
x primary keys // foreign keys
x relationships

5(d)(ii) 1 mark for each bullet point (max 2): 2


x the overview of a database structure
x models the problem / situation
x ... by using methods such as an ER diagram
x independent of any particular DBMS

Question Answer Marks

6(a)(i) 1 mark for each method of ensuring authenticity (max 2): 2

x (email) message put through hashing algorithm to produce a digest


x Digest encrypted with sender’s private key (to create the digital signature)
x the (digital) signature can only be decrypted with matching sender’s
public key

© UCLES 2022 Page 6 of 10


MUHAMMAD ALI KHAN
PAGE 914
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

6(a)(ii) 1 mark for each bullet point: 3


x monitors incoming and outgoing packets / traffic
x checks against an allow list / deny list of IP addresses // checks against
a set of rules for acceptable data / ports etc.
x blocks transmissions that do not meet criteria / rules // allows through is
satisfies the criteria /rules

6(b)(i) 1 mark for each bullet point (max 2): 2


x improves the accuracy of the sound file
x ... because (digital) waveform more closely resembles the analogue
waveform
x quantization errors are reduced
x increases the amount of detail stored

6(b)(ii) 1 mark for each bullet point: 2


x decreases the file size of the sound file
x ... because fewer bits are used to store each sample

© UCLES 2022 Page 7 of 10


MUHAMMAD ALI KHAN
PAGE 915
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

7(a) 1 mark for each set of highlighted rows. 5

Instruction Memory address


ACC IX
address 100 101 102 103 110 111 112
0 0 112 4 1 4 0
75 0
76 1
77
78
79
80
84 2
85 2
86 0
87 1
88 1
89 1
90
76 4
77
78
79
80
81 6
82 6
83
86 1
87 2
88 2
89 2
90

7(b)(i) 0100 1100 1

© UCLES 2022 Page 8 of 10


MUHAMMAD ALI KHAN
PAGE 916
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

7(b)(ii) 0100 0001 1

7(b)(iii) 1001 1000 1

7(b)(iv) 1101 1111 1

7(c) 1 mark for each correct row: 3

Description Register transfer notation

Copy the address of the next instruction into


MAR Å [PC]
the Memory Address Register.

Increment the Program Counter. PC Å [PC] + 1

Copy the contents of the Memory Data


CIR Å [MDR]
Register into the Current Instruction Register.

Question Answer Marks

8(a) 1 mark one or two correct row(s). 2 marks for all three correct rows. 2

Increases Decreases No change to


Action
the file size the file size the file size

Change the colour depth of


the image file to 16 bits per 9
pixel.

Change the screen resolution


9
to 1366 u 768 pixels.

Change the colour of the


9
rectangle from black to red.

8(b) 1 mark for each bullet point (max 2). 2


For example:
x can be enlarged without pixelation / loss of quality
x individual components of the image can be edited
x generally a smaller file size

8(c)(i) 1 mark for each correct underlined part: 2

Uncompressed sound RLE compressed sound

EA F1 F1 F2 F2 F2 EA 1EA 2F1 3F2 1EA

AB AB FF FF 1D 67 2AB 2FF 11D 167

32 32 80 81 81 232 180 281

© UCLES 2022 Page 9 of 10


MUHAMMAD ALI KHAN
PAGE 917
9618/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2022

Question Answer Marks

8(c)(ii) 1 mark for each bullet point: 2


x all the data is required // no data can be lost
x ... otherwise text file will be corrupted / not make sense

Question Answer Marks

9 1 mark for each bullet point (max 2). 2


For example:
x incorrect recognition of faces leads to mistakes such as
x ... access to facilities / systems may be denied
x privacy issues / people do not like data being stored
x individuals will feel safer
x ... there might be a reduction in crime
x faster boarding
x catching criminals

Question Answer Marks

10(a) all four computers directly connected to the switch and no other connections. 1

10(b)(i) 1 mark for the device. 1 mark for corresponding reason. 2

x Device: Server
x Reason: Server processes the requests and authorises traffic // firewall
software on the server authorises traffic // server acts as the proxy

x Device: Switch
x Reason: Switch is connected to all the computers // to share access to
the router on the network

10(b)(ii) 1 mark for each bullet point (max 3): 3

x receive packets from devices / internet


x find destination of packets using the IP address
x forward packets to the destination
x assign private IP addresses to devices on LAN
x store/update/maintain a routing table
x find most efficient path to destination
x maintain table of MAC and IP addresses
x provides the LAN with a public IP address
x acts as a gateway
x performs protocol conversion
x acts as a firewall

© UCLES 2022 Page 10 of 10

You might also like