Professional Documents
Culture Documents
Topic Number of Pages
Topic Number of Pages
1. Number System 2 | 31 | 77 | 119 | 142 | 163 | 186 | 266 | 340 | 503 | 527 | 567 | 659 |
2. Sound | Images | 3 | 62 | 79 | 97 | 105 | 121 | 167 | 232 | 250 | 314 | 341 | 364 | 402 | 426 | 451 | 564 | 583 |
Compression 604 | 637 | 675 | 696 | 706 | 720 | 764 | 803 | 848 | 903 | 909
3. Assembly Language 5 | 32 | 42 | 85 | 128 | 144 | 169 | 187 | 234 | 252 | 270 | 294 | 382 | 406 |
428 | 457 | 472 | 501 | 569 | 587 | 608 | 653 | 676 | 702 | 724 | 750 | 782 |
809 | 850 | 879 | 904
4. Monitoring and 6 | 59 | 743 |
Controlling Systems
5. Internet Communications 7 | 55 | 60 | 102 | 103 | 150 | 236 | 313 | 320 | 404 | 437 | 523 | 562 |
6. Input Output Devices 9 | 76 | 164 | 185 | 230 | 249 | 275 | 297 | 366 | 378 | 475 | 518 | 521 |
7. Logic Gates 10 | 39 | 82 | 165 | 184 | 318 | 337 | 362 | 438 | 479 | 539 | 568 | 585 |
606 | 630 | 678 | 708 | 749 | 774 | 798 | 828 | 858 | 872 | 898
8. Von Neumann and OS 12 | 37 | 56 | 98 | 120 | 233 | 256 | 269 | 289 | 292 | 316 | 325 | 336 | 359
410 | 436 | 471 | 492 | 516 | 519 | 538 | 590 | 605 | 675 | 696 | 701 723
389 | 454 | 477 | 497 | 525 | 540 | 565 | 588 | 612 | 635 | 648 | 679 | 733
11. Memory 35 | 75 | 162 | 190 | 324 | 546 | 561 | 629 | 731 |826
MUHAMMAD ALI KHAN
12. IP 57 | 99 | 124 | 380 | 433 | 450 | 468 | 661 | 683 | 698 | 755 |
13. Ethics 58 | 81 | 100 | 123 | 143 | 276 | 296 | 386 | 411 | 432 | 435 | 452 | 456 |
14. Translator 64 | 107 | 118 | 142 | 267 | 290 | 412 | 455 | 470 | 632 | 647 | 697 | 777 |
833 | 857 |
X
MUHAMMAD ALI KHAN
PAGE 11
ShopSales
ShopSales
SalesPerson
FirstName Shop
SalesProducts
SalesProducts
PAGE 16
First pass or
Activity
second pass
PAGE 33
1 MAR [PC]
2 PC [PC] + 1
3 MDR [[MAR]]
4 CIR [MDR]
[register]
LDD 35
PAGE 38
Instruction
Explanation
Op code Operand
PAGE 43
320 49
321 36
322 0
323 0
file server
mail server
PAGE 62
file server
mail server
PAGE 104
55
10000011
-102
4E
PAGE 120
255
153
3.2A.6AA.BBBB
2.0.255.1
6.0.257.6
A.78.F4.J8
PAGE 125
CLASS(ClassID, Subject)
CLASS-GROUP(StudentID, ClassID)
CLASS CLASSGROUP
CLASS-GROUP STUDENT
StudentID FirstName
LastName
LastName
ClassID
MUHAMMAD ALI KHAN
PAGE 127
LDD <address>
LDX <address>
STO <address>
ADD <address>
INC <register>
DEC <register>
CMP <address>
JPE <address>
JPN <address>
JMP <address>
OUT
END
60 0011 0010
61 0101 1101
62 0000 0100
63 1111 1001
64 0101 0101
65 1101 1111
66 0000 1101
67 0100 1101
68 0100 0101
69 0100 0011
...
1000 0110 1001
0 0 0 0 1 0 0 0
MUHAMMAD ALI KHAN
PAGE 128
LDX 60
DEC IX
MUHAMMAD ALI KHAN
PAGE 129
50 LDD 100
51 ADD 102
52 STO 103
53 LDX 100
54 ADD 100
55 CMP 101
56 JPE 58
57 JPN 59
58 OUT
59 INC IX
60 LDX 98
61 ADD 101
62 OUT
63 END
...
100 20
101 100
102 1
103 0
1
MUHAMMAD ALI KHAN
PAGE 130
20 100 1 0 1
PAGE 131
01001101
82
11001011
198
PAGE 143
LDD <address>
LDX <address>
STO <address>
ADD <address>
INC <register>
DEC <register>
CMP <address>
JPE <address>
JPN <address>
JMP <address>
OUT
END
1 1 0 0 1 1 0 1
INC IX
MUHAMMAD ALI KHAN
PAGE 145
LDX 90
DEC ACC
STO 90
INC IX
LDX 90
DEC ACC
CMP 90
JPE 29
JPN 31
ADD 90
OUT
ADD 93
STO 93
OUT
END
90
55
34
2
MUHAMMAD ALI KHAN
PAGE 146
90 91 92 93
2 90 55 34 2
PAGE 147
STUDENT
QUALIFICATION
STUDENT-QUALIFICATION
STUDENT
STUDENT-QUALIFICATION
MUHAMMAD ALI KHAN
PAGE 149
QUALIFICATION
STUDENT-QUALIFICATION
W
T
PAGE 165
X
MUHAMMAD ALI KHAN
PAGE 166
LDD <address>
address
LDX <address>
STO <address>
ADD <address>
CMP <address> address
address
JPE <address>
address
JPN <address>
JMP <address>
OUT
END
0110 0100
0111 1100
1001 0111
0111 0011
1001 0000
0011 1111
0000 1110
1110 1000
1000 1110
1100 0010
1011 0101
LDD 802
LDX 800
PAGE 170
LDD 800
ADD 801
STO 802
LDD 803
CMP 802
JPE 107
JPN 110
STO 802
OUT
JMP 112
LDD 801
OUT
END
40
50
0
90
40 50 0 90
PAGE 172
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2016 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.
Secondary key
Any object, person or thing about
which it is possible to store data
Candidate key
Primary key
Attribute(s) in a table that link to a
primary key in another table to form a
relationship
Table
[5]
© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 175
Cascading update
If a record in the primary table is modified
all linked records in foreign tables will also be modified [3]
DRAM uses higher power( because it requires more circuitry for refreshing)
// SRAM uses less power (no need to refresh)
© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 176
Provides software platform / environment on which other programs can be run [2]
Security management
Interrupt handling
Provision of a user interface run only if not given in part (b)(i) [2]
The DDL file can be made available to several applications (at the same time) [2]
© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 177
(ii) 1 1 0 1 0 0 1 0 [1]
(iii) 2 E [1]
(b) (i) One mark for the explanation and one mark for the example
(ii) One mark for the explanation and one mark for the example
Binary number is split up into groups of 4 bits (starting from the right)
// Each group of 4 bits is converted to a denary digit
Example: 0011 0111 = 37
[2]
4 (i) Keyboard
Any two from:
Uses switches and circuits to translate keystrokes into signals the computer can
understand
The key matrix is a grid of circuits / three layers of plastic underneath the keys
Each circuit is broken beneath the key / middle layer contains holes
When key pressed, a circuit is made / completed and a signal is sent
Processor compares location of signal from key matrix to a character map stored on
ROM
A character code for each key press is saved in a keyboard buffer [2]
© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 178
(iv) Scanner
Any two from:
© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 179
[5]
0 0 0 0
0 0 1 0
0 1 0 1
0 1 1 0
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 0
[4]
© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 180
7 (a) One mark for the name and one mark for the explanation for three utility programs
Disk formatter
Prepares a hard disk to allow data to be stored on it
Virus checker
Checks for viruses and then quarantines removes any virus found
File compression
Reduces file size by removing redundant details (lossy / lossless)
Backup software
Makes copy of files on another medium in case of corruption / loss of data
Firewall
Prevents unauthorised access to computer system from external sources [6]
Bitmap files are usually bigger than vector graphics files // Take up more memory space
© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 181
(c) (i) Hackers can still access the data (and corrupt it, change it or delete it)
Encryption simply makes data incomprehensible (without decryption key / algorithm)
[2]
(iii) A password does not prevent unauthorised access, it makes it more difficult
Password can be guessed (if weak) // Password can be stolen // A relevant example
of misappropriation of password [2]
8 (a) (i)
Accumulator: 1 0 0 1 0 1 1 1
[1]
(ii) One mark for answer and two marks for explanation
Accumulator: 1 1 0 0 0 0 1 0
Memory address
ACC OUTPUT
800 801 802 803
40 50 0 90
40
90 90
90 90
[4]
© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 182
© UCLES 2016
PAGE 183
93
3A
65
58
0100 1001
63
01011101
73
49
11000001
93
MUHAMMAD ALI KHAN
PAGE 187
LDD <address>
address
LDX <address>
LDI <address>
STO <address>
INC <register>
ADD <address>
END
0000 0010
1001 0011
0111 0011
0110 1011
0111 1110
1011 0001
0110 1000
0100 1011
1001 1110
MUHAMMAD ALI KHAN
PAGE 188
LDD 102
LDX 101
LDI 103
MUHAMMAD ALI KHAN
PAGE 189
LDD 810
INC ACC
STO 812
LDD 811
ADD 812
STO 813
END
28
41
0
0
Memory address
ACC
28 41 0 0
PAGE 190
MEMBER CLASS
BOOKING
MUHAMMAD ALI KHAN
PAGE 193
CLASS ClassID
CLASS
MUHAMMAD ALI KHAN
PAGE 194
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the October/November 2016 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.
[6]
Working space
B S P X
0 0 0 1
0 0 1 1
0 1 0 1
0 1 1 0
1 0 0 0
1 0 1 0
1 1 0 1
1 1 1 0
[4]
© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 196
2 (a) The number of images / frames recorded per second / unit time.
// The frequency with which the images/frames are recorded.
[1]
(b) ONE mark per bullet point below. MAX THREE marks per type of encoding.
Interlaced encoding
The data from a single frame are encoded as two separate fields.
One containing the data for the even numbered rows / lines and the other has the data
for the odd numbered rows / lines.
The image is rendered by alternating between the even field and the odd field (of each
successive frame).
The viewer sees data from two frames simultaneously
The rate of picture display (the field rate) is twice the rate of image frame display (the
frame rate).
Originally used in television broadcasting and adapted for video recordings.
Produces what appears to the eye to be a high refresh rate.
Halves the transmission bandwidth requirements.
Progressive encoding
Stores the data for an entire frame and displays all the frame data at the same time.
The rate of picture display is the same as the frame rate.
Used by traditional film / video digitised from a film camera / computer displays
progressive encoding.
High bandwidth requirements.
[4]
Description Term
© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 197
Then ONE mark for any pair of letters in the correct order, but not in the correct place
2 G
4 F
5 D
6 H
7 C
8 B
9 A
10 E
[8]
© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 198
Extra lines from left hand box, no mark for that box.
93
Hexadecimal:
3A
- 65
BCD representation:
58
0100 1001
- 63
Binary integer:
01011101
73
Twos complement
binary integer: 49
11000001
- 93
[4]
© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 199
5 (a) (i)
0 1 1 1 0 0 1 1
[1]
(ii) ONE mark for Accumulator contents, ONE mark for the explanation.
1 0 1 1 0 0 0 1
Index Register holds the value 4; 101 + 4 = 105 so load data from address 105
[2]
(iii) ONE mark for Accumulator contents, TWO marks for the explanation.
0 1 0 0 1 0 1 1
Memory address
28 41 0 0
28
29
29
41
70
70
[6]
© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 200
6 (a) ONE mark for each difference from the bullet points below.
RAM loses content when power turned off / volatile memory / temporary memory
ROM does not lose content when power turned off / non-volatile memory / permanent
memory
DRAM uses higher power (because it requires more circuitry for refreshing)
//SRAM uses less power (no need to refresh)
© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 201
7 ONE mark per bullet point, MAX TWO marks per task.
Security management
Makes provision for recovery when data is lost
Provides usernames and passwords / encryption / user accounts
Prevents unauthorised access
Ensures privacy of data
Interrupt handling
Identifies priorities of interrupts
Save current memory / process values / saves data on power outage
Loads appropriate Interrupt Service Routine (ISR)
Any relevant example
[4]
© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 202
8 (a) ONE mark for each bullet point from MAX TWO groups.
The programmer can use, e.g. mathematical / graphics functions, etc. (may not know
how to code)
Can be sure that the function will perform as it should // simplifies the program.
(b) (i) ONE mark for each benefit, and ONE mark for a further expansion.
The executable file is smaller / the executable does not contain all the library
routines
DLL files are only loaded into memory when required.
Changes / improvements / error correction to the DLL file code are done
independently of the main program...
So there is no need to recompile the main program
All programs using it will benefit
(ii) ONE mark for each bullet point from MAX ONE group.
[2]
© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 203
9 (a) ONE mark for each reason and ONE mark for a further explanation. MAX THREE reasons.
The database (generally) stores data only once / data need only be updated once
Improved data consistency / integrity / associated data will be automatically
updated / easier to maintain the data / elimination of unproductive maintenance
Security is improved
Each application only has access to the fields it needs // different users can be given
different access rights
Different users can be given different views of the data / data privacy is maintained
So they do not see confidential information
© UCLES 2016
MUHAMMAD ALI KHAN
PAGE 204
[2]
Mark as follows:
1 mark for CREATE TABLE CLASS and ();
1 mark for PRIMARY KEY(ClassID)
1 mark for both ClassID VARCHAR(5),and Description VARCHAR(30),
1 mark for both StartDate DATE, and ClassTime TIME,
1 mark for NoOfSessions INT,
1 mark for AdultsOnly BIT,
[6]
© UCLES 2016
PAGE 205
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.
1(a) Many-to-one 1
1(c)(iii) 2
B-NURSE B-WARD
B-WARD-NURSE
3(b)(i) Pixel 2
Smallest picture element which can be drawn 1
Screen resolution
The number of pixels which can be viewed horizontally and vertically on the screen //
or by example - A typical screen resolution is 1680 pixels 1080 pixels. 1
3(b)(ii) 8 1
4(a)(i) 500 1
4(a)(ii) 496 1
4(a)(iii) 502 1
4(a)(iv) 86 1
4(b) 3
0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 1
0 0 0 0 0 1 1 0 0 1 1 0 0 0 0 1
4(c) 256 1
4(d)(i) 07 C2 2
07 1
C2 1
4(d)(ii) LDI 63 2
LDI 1
63 1
5(a)(i) Count the number of one bits in the first seven bit positions 1 2
Add a 0 or 1 to bit position 0, to make the count of one bits an odd number 1
5(a)(ii) A=1 1
B=1
5(b)(i) 2
6(a) 3
One mark for each correct line from each left hand box to max three marks.
7(c)(ii) 6 19 1
7(c)(iii) 11 1
7(c)(iv) Checks that the product code has not be left blank // presence check on product 1
code
Range check 1
Check the number entered is (say) between 1 and 100 1
Format check 1
Checks the product code is a particular format // Checks the number has digit
characters only // by example 1
Length check 1
The number of items has exactly five characters 1
Existence check 1
To ensure the product code has been assigned 1
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.
1(b)(i) 3
SHOP has primary key ShopID and SUPPLIER has primary key
SupplierID 1
SHOP-SUPPLIER has primary key ShopID + SupplierID 1
Both SHOP and SUPPLIER show foreign key as None 1
SHOP-SUPPLIER shows foreign key ShopID or SupplierID 1
Explanation for SHOP-SUPPLIER foreign key describes ShopID or
SupplierID creating a link 1
Type of printer
Laser Inkjet
Impact printer
1
Non-impact printer
Line printer
1
Page printer
3(b)(ii) 4 1
4(a)(ii) One mark for the name and one mark for description. Max 4
Max two management tasks.
Interrupt handling 1
Identifies priorities of interrupts // Saves data on power outage // Loads
appropriate Interrupt Service Routine (ISR) // By example 1
Security management 1
Makes provision for recovery when data is lost // Provides usernames and
passwords // Prevents unauthorised access // Ensures privacy of data 1
5(a)(i) 351 1
5(a)(ii) 355 1
5(a)(iii) 22 1
5(a)(iv) 86 1
0 0 0 1 0 0 1 0 0 1 0 0 0 0 1 1
0 0 0 1 0 1 0 1 0 0 0 0 0 1 1 1
5(c)(i) 14 5E 2
14 1
5E 1
LDR 1
#77 1
6(b) 1. The user keys in the Uniform Resource Locator (URL) into 4
the browser Software.
2. E // The Domain Name Service (DNS) uses the domain 1
name from the browser to look up the IP address of the web
server.
3. D // The web server retrieves the page 1
4. F // Sends the web page content to the browser 1
5. B // Browser software renders the page and displays 1
6(c)(ii) 6 21 1
6(c)(iii) 13 1
6(c)(iv) Checks that the RunnerID entered starts with the characters CAM or VAR only 1
Format check 1
RunnerID is three letter characters followed by two digit characters
//Position is digit characters only 1
Length check 1
RunnerID has exactly five characters 1
Range check 1
The value for Position is between1 and (say) 50 1
Presence check 1
The text box for RunnerID or Position is not empty 1
Existence check 1
To ensure that RunnerID has been registered 1
Uniqueness check 1
To ensure no two runners have the same number 1
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.
1(a) Many-to-one 1
1(c)(iii) 2
B-NURSE B-WARD
B-WARD-NURSE
3(b)(i) Pixel 2
Smallest picture element which can be drawn 1
Screen resolution
The number of pixels which can be viewed horizontally and vertically on the screen //
or by example - A typical screen resolution is 1680 pixels 1080 pixels. 1
3(b)(ii) 8 1
4(a)(i) 500 1
4(a)(ii) 496 1
4(a)(iii) 502 1
4(a)(iv) 86 1
4(b) 3
0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 1
0 0 0 0 0 1 1 0 0 1 1 0 0 0 0 1
4(c) 256 1
4(d)(i) 07 C2 2
07 1
C2 1
4(d)(ii) LDI 63 2
LDI 1
63 1
5(a)(i) Count the number of one bits in the first seven bit positions 1 2
Add a 0 or 1 to bit position 0, to make the count of one bits an odd number 1
5(a)(ii) A=1 1
B=1
5(b)(i) 2
6(a) 3
One mark for each correct line from each left hand box to max three marks.
7(c)(ii) 6 19 1
7(c)(iii) 11 1
7(c)(iv) Checks that the product code has not be left blank // presence check on product 1
code
Range check 1
Check the number entered is (say) between 1 and 100 1
Format check 1
Checks the product code is a particular format // Checks the number has digit
characters only // by example 1
Length check 1
The number of items has exactly five characters 1
Existence check 1
To ensure the product code has been assigned 1
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2017 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.
1(a)(i) 119 1
1(a)(ii) 120 1
1(a)(iii) 1 1 1 0 1 1 1 1 1
1(b)(ii) The second block of four binary digits represents a digit larger than 9 // 14 1
2(a) 4
Physical measures
Access rights
Encryption
Firewall
Use authentication methods such as usernames and passwords
Anti-malware program
3(b)(i) 4
7 X 6 = 42
8 X 5 = 40
6 X 4 = 24 1 mark for 6 values
5 X 3 = 15
3 X 2 = 6
1 X 1 = 1
Total: 128 / 11
11 R 7 1 mark for 2 steps
Accept 128 MOD 11 = 7
Check digit: 11 7 = 4 1 mark for subtraction
Uniqueness check
Each PatientID must be unique
Length check
Each PatientID is exactly 7 characters
Presence check
PatientID must be entered
B E6 68 (1)
Diaphragm / cone
(Voice) coil of wire
Spider / Suspension
(Permanent) Magnet
Basket
Dust cap
Outer frame
7(a)(i) PatientID 2
(1)
DoctorID
7(a)(ii) 2
Special case for 1 mark only (only if no one to many relationships shown)
Many PATIENTs are seen by many DOCTORs
UPDATE DOCTOR
SET DoctorID = '017'
WHERE DoctorID = '117';
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2017 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.
Interrupt Handling
Halts the execution of the current process
Stores the values of the current process on the stack
Loads and executes the appropriate ISR code
Use of priorities for handling simultaneous interrupts
Saves data on power outage
Security Management
Makes provision for recovery when data is lost
Provides usernames and passwords / encryption / user accounts
Prevents unauthorised access
Ensures privacy of data
Once translated the compiler software is not needed to run the program
Compiled code should execute faster
Compiler produces an executable file
The executable file produced by a compiler can be distributed without users
having sight of the source code // source code is kept secure // users are unable
to make changes to the program
Cross-compilation is possible
Easier de-bugging
The interpreter stops when error encountered
error can be corrected in real time
The interpreter translates a statement then executes it immediately
Parts of the program can be tested, without all the program code being available.
Physical measures
Locked doors/keyboards etc.
Secure methods of access, keypads/ biometric scans etc.
Backup of data
Regular copies of the data are made
If the data is corrupted it can be restored
Disk-mirroring
All activity is duplicated to a second disk in real time so that if the first disk fails
there is a complete copy available
Access rights
Different access rights for individuals/groups of users
To stop users editing data they are not permitted to access
By example
Encryption
If accessed, data cannot be understood by unauthorised personnel
Accessed only by those with the decryption key
Firewall
To stop unauthorised access/hackers gaining access to the computer network
Anti-malware program
To detect / remove / quarantine viruses / key-loggers etc.
Carrying out regular scans
Checking that the data entered matches / is consistent with that of the source.
Comparison of two versions of the data
Examples include double entry, visual checking, proof reading etc...
In the event of a mismatch the user is forced to re-enter the data
By example, e.g. creation of a password
Does not check data is sensible/acceptable
Macro
A group of instructions given a name // subroutine
A group of instructions that need to be executed several times within the same
program
The statements are written once and called using the name whenever they need
to be executed
Macro code is inserted into the source file at each place it is called
By example
Directive
An instruction that directs the assembler to do something
A directive is not a program instruction
It is information for the assembler
By example
For example: State the start address for the program //tell the assembler to set aside
space for variables // include an external file etc.
Table entries:
1 Mark per bullet, max 4
EndProg
2 Unknown
9
14
8
Numbering:
1 Mark per bullet, max 2
7 9
5
Public
Incident B Product
Ethical
Incident C Judgement
Incident D Management
Unethical
Incident E Profession
Incident F Colleagues
Self
The hard disk has one or more platters made of aluminium or glass
Each surface of the platter/disk is ferrous-oxide which is capable of being
magnetised
The platters/disks are mounted on a central spindle
The disks are rotated at high-speed
Each surface of the disk has a read/write head mounted on an arm positioned
just above the surface
Electronic circuits control the movement of the arm and hence the heads
The surface of the platter/disk is divided into concentric tracks and sectors
One track in one sector is the basic unit of storage called a block
The data is encoded as a magnetic pattern for each block
When writing to disk, a variation in the current in the head produces a variation
in magnetic field on the disk
When reading from disk, a variation in magnetic field produces a variation in
current through the head
7(a)(i) 1 Mark for correct primary key identified in both STAFF and CLIENT 3
STAFF(StaffID, StaffName, Department)
CLIENT(ClientName, Address, Town)
CLIENT VISIT
VISIT INTERVIEW
INTERVIEW STAFF
UPDATE CLIENT
SET ClientName = 'Albright Holdings'
WHERE ClientName = 'ABC Holdings';
There may be records in the VISIT and INTERVIEW tables / other tables with
client name ABC Holdings
The ClientName in the VISIT and INTERVIEW tables / other tables might not
be automatically updated
Records in the VISIT and INTERVIEW tables / other tables will become
orphaned
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2018 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Radio
waves Large range of wavelengths
Satellite
A B C Working space X
0 0 0 0
0 0 1 1
0 1 0 1
0 1 1 0
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 1
True False
Parity bit
0 0 1 0 0 0 0 0
Parity
Data
bit
1 1 0 1 0 1 1 1
1 0 0 0 1 1 1 0
0 1 0 0 1 0 1 1
1 1 1 0 1 1 1 1
Parity 1 1 1 1 1 0 0 1
byte
6(d) 1 mark for the name and max 2 marks for description 3
Check sum
A calculation is done on a block of data
The result is transmitted with the data
Calculation repeated at receiving end
Results compared
If different an error has occurred
Hash total
Total of several fields of data
Including fields not usually used in calculations
The result is transmitted with the data
Calculation repeated at receiving end
Results compared
If different an error has occurred
8(c)(i) 135 1
8(c)(ii) 87 1
8(c)(iii) 121 1
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2018 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Working space
A B C X
0 0 0 1
0 0 1 1
0 1 0 1
0 1 1 0
1 0 0 0
1 0 1 0
1 1 0 0
1 1 1 0
Parity bit
0 0 1 0 0 0 0 0
Parity
Data
bit
1 0 1 0 1 1 1 1
0 1 1 0 0 1 1 0
1 1 0 0 0 0 0 0
0 1 0 0 0 0 0 0
Parity
byte 0 0 0 0 1 0 0 1
4(a)(i) 219 1
4(a)(ii) DB 1
4(a)(iii) 37 1
Working:
Answer: 5A16
5(d) 1 mark for naming feature/tool, 1 mark for description. Max 2 feat ures 4
e.g.
Fading
Change the volume of a section of the sound for it get lou der/quieter
Copy
Repeat elements of the sound wave
6(b) 25 1
6(d)(i) Client-side 1
1NF
No repeated groups of attributes
All attributes should be atomic
No duplicate rows
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2018 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
$gradeChar
$inputMark
1(b) 03 1
1(c) Gets the value stored in the text box / input field mark... 2
To be used as a parameter in calculateGrade
1(d) Server-side 1
e.g.
Validation rules
Referential integrity
Verification
Input masks
Setting data types
Removing redundant data
Backup data
Access controls
Audit trail
True False
3(c)(i) 193 1
3(c)(ii) C1 1
3(c)(iii) 63 1
3(c)(iv) The first 4 bits / first nibble (would give 12 which) is > 9 / 2 digits (which is not valid 1
for BCD)
Parity
Data
bit
0 0 1 1 0 1 0 1
1 1 1 1 1 0 0 1
1 0 1 0 1 0 0 0
0 0 0 1 1 0 1 1
Parity
byte 0 1 1 1 1 1 0 1
Type check
Verification
Proof reading
Checksum
A B C Working space X
0 0 0 0
0 0 1 0
0 1 0 1
0 1 1 0
1 0 0 1
1 0 1 0
1 1 0 0
1 1 1 0
6(a) 1 1
6(b) 1 mark for correct method (colour code and number of pixels) 3
1 mark for first 7 groups correct
1 mark for remainder correct
6(c) 5 1
6(e) 1 mark for naming tool, 1 mark for describing effect on the photograph 6
e.g.
Resize
Increase / decrease the size of the image
Crop
Remove part of the image
Blur
Reduce the focus
7(b)(ii) 1 mark for naming input device 1 mark for use in this scenario, for max 2 devices 4
e.g.
Microphone
...visitor says commands / search criteria for the computer to respond to
Keyboard
...visitor types key words to look for
Mouse
...visitor controls cursor to navigate / select
Trackpad
...visitor uses finger to control cursor to navigate / select
1 mark per bullet. Max 2 marks for each reason, max two reasons
e.g.
Hard drive
Large capacity...
to store videos / images / sound files with large file sizes
Solid state
Large capacity
To store videos/images/sound files with large file sizes
Reliable...
Can be dropped/damaged and will likely still work / no moving parts
Quiet...
No moving parts
7(d) 1 mark for a correct reason for RAM, 1 mark for a correct reason for ROM 2
RAM
Currently running data / video / music / images / software
ROM
Boot up instructions / OS kernel
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (ST) 144490/3
© UCLES 2018 [Turn over
MUHAMMAD ALI KHAN
PAGE 378
1 A student is creating a short video and needs to record music to play in the background.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
Explain how different sampling resolutions affect the sound file and the sound it represents.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
Describe two features of sound editing software that can be used to edit the sound file.
Feature 1 ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Feature 2 ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(d) The video is recorded with a frame rate of 60 frames per second (fps) and uses progressive
encoding.
...........................................................................................................................................
.......................................................................................................................................[1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...................................................................................................................................................
...............................................................................................................................................[1]
(a) State how Computer A could access the web page without using a Domain Name Service
(DNS).
...................................................................................................................................................
...............................................................................................................................................[1]
21E5:69AA:FFFF:1:E100:B691:1285:F56E
::255.255.255.255
59FB::1005:CC57:6571
56FE::2159:5BBC::6594
[4]
(ii) The following table shows four statements about either public or private IP addresses.
Tick () one box in each row to indicate whether each statement refers to a public or a
private IP address.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
3 Hugo has produced a program (app) for mobile phones. He needs to decide whether to use an
Open Source licence or to distribute the app as shareware.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Shareware ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(b) Tick () one box to indicate the licence Hugo should use. Justify your choice.
Open Source
Shareware
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
4 The table shows assembly language instructions for a processor which has one general purpose
register, the Accumulator (ACC) and an index register (IX).
Instruction
Explanation
Op code Operand
Direct addressing. Load the contents of the location at the given
LDD <address>
address to ACC.
Indexed addressing. Form the address from <address> + the
LDX <address> contents of the Index Register. Copy the contents of this calculated
address to ACC.
LDR #n Immediate addressing. Load the number n to IX.
STO <address> Store contents of ACC at the given address.
ADD <address> Add the contents of the given address to ACC.
INC <register> Add 1 to the contents of the register (ACC or IX).
DEC <register> Subtract 1 from the contents of the register (ACC or IX).
CMP <address> Compare contents of ACC with contents of <address>.
Following a compare instruction, jump to <address> if the compare
JPE <address>
was True.
Following a compare instruction, jump to <address> if the compare
JPN <address>
was False.
JMP <address> Jump to the given address.
OUT Output to the screen the character whose ASCII value is stored in ACC.
END Return control to the operating system.
(a) (i) State what is meant by direct addressing and indirect addressing.
...........................................................................................................................................
...........................................................................................................................................
[2]
(ii) Explain how the instruction ADD 20 can be interpreted as either direct or indirect
addressing.
...........................................................................................................................................
...........................................................................................................................................
[2]
(b) The assembly language instructions in the following table use either symbolic addressing or
absolute addressing.
Tick () one box in each row to indicate whether the instruction uses symbolic or absolute
addressing.
ADD 90
CMP found
STO 20
[2]
X 1 0 1 1 1 0 1 0
.......................................................................................................................................[1]
.......................................................................................................................................[1]
(iii) 7KHFRQWHQWVRI;UHSUHVHQWDWZR·VFRPSOHPHQWELQDU\LQWHJHU
.......................................................................................................................................[1]
(d) The current contents of the main memory, Index Register (IX) and selected values from the
ASCII character set are provided with a copy of the instruction set.
Complete the trace table for the given assembly language program.
[8]
10
5 For each of the following scenarios, tick () one box for each scenario to indicate whether you
WKLQNWKHSHUVRQ·VEHKDYLRXULVHWKLFDORUXQHWKLFDO-XVWLI\\RXUFKRLFH
(a) Kevin is a software engineer who has recently started a job with a new company. He is using
SURJUDPFRGHIURPKLVSUHYLRXVHPSOR\HULQKLVQHZHPSOR\HU·VSURJUDPV
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Nadya is a software developer. She has accepted a new job. She has never worked with
the programming languages used by this new company. Nadya is planning to increase her
knowledge of these programming languages before she starts her new job.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) Maria finds that one of her team members has produced some inventive code. She presents
this to her manager, stating that it was produced by the team. She does not mention the
LQGLYLGXDO·VQDPH
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
11
01 <?php
02 if(isset($_GET['age'])) {
03 echo "Result: ", allowed($_GET['age']);
04 } else {
05 ?>
06
07 <form action="#" method="get">
08 Enter Age: <input type="text" name="age" /><br/>
09 <input type="submit" value="Calculate" />
10 </form>
11
12 <?php
13 }
14 function allowed($age) {
15 if($age <= 16) $message = "You need permission";
16 else if($age > 30) $message = "You are too old";
17 else $message = "Allowed";
18 return $message;
19 }
20 ?>
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Write the value assigned to $message if the user types 30 in the text box.
...............................................................................................................................................[1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
12
List the sequence of events that take place when a user requests a web page containing PHP
code.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
14
7 A movie theatre has a relational database that stores the movie schedule, and information about
the movies. The theatre has several screens that play movies at the same time.
The database has three tables to store information about the movies, the screens and the movie
schedule.
SCREEN(ScreenNumber, NumberSeats)
(a) Complete the entity-relationship (E-R) diagram to show the relationships between these
tables.
MOVIE SCREEN
MOVIESCHEDULE
[2]
(b) Explain how primary and foreign keys are used to link the tables in the movie theatre
database.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
15
(c) The database needs to store the name of the company that produced each movie, for
example, Rocking Movies.
Write an SQL script to add the attribute ProductionCompany to the MOVIE table.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(d) Write an SQL script to display the title and rating of all movies scheduled to play on screen
number 3.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
For example:
Cut/delete
... Remove part of the sound file
Amplify
... Increase the volume of a section of sound
Each frame contains (all the lines for) the complete image
All the frame data is recorded at the same time
Each frame contains all the scan lines
The number of images stored is the same as the frame rate
21E5:69AA:FFFF:1:E100:B691:1285:F56E Valid
::255.255.255.255 Valid
59FB::1005:CC57:6571 Valid
56FE::2159:5BBC::6594 Invalid
Fibre-optic
Wi-Fi / Radio waves
Microwave
Infrared
Open Source
The source code is released with program
Users can edit the source code to suit their needs
Users re-release their version under the same terms
Can be cost-free but may also need payment
Shareware
Users get a free trial of the software
« which may be limited in features
No access to source code // Program cannot be edited
Then they have to pay / sign-up after the expiry date // Then they have
to pay / sign-up to get full functionality // Then they have to pay / sign-up
to stop unwanted pop-ups, etc.
3(b) 1 mark per bullet point to max 2 marks for chosen licence 2
Open Source
For example:
Hugo does not have to set up ways to take funds
Others may enhance / improve the program
Hugo can charge a fee for the App
Or
Shareware
For example:
Hugo can charge for the App
Not giving away the code/people can't copy the code
« Hugo gets the sole recognition for the program
Possible legal consequences if someone does copy the code
If users need to sign up, their data can be used for marketing etc.
Customers have peace of mind that the software hasn’t been
maliciously edited / bugs introduced
Direct addressing
The operand is the address where the data is stored
Indirect addressing
The operand is an address, that address holds another address where
the data is stored
Direct addressing:
20 is the address of the data
Indirect addressing:
20 is an address which holds the address where the data is stored
ADD 90 9
CMP found 9
STO 20 9
4(c)(i) 186 1
4(c)(ii) BA 1
4(c)(iii) –70 1
71 *
72 130
73 0
74 1
75 1
76 1
77 133
78
79
81 1
82
83
74 2
75 2
76 2
77 130
78
79
80 *
81 2
82
83
84
Either Unethical
Work belongs to the company it was created for // copyright
« Kevin cannot use it without permission
It reduces the integrity of the person / profession / new company
Reference to IEEE standards in context
Or Ethical
The program code could be open source
Kevin might own the copyright of code
Kevin may have permission to use the code
Reference to IEEE standards in context
Either Unethical
Nadya has accepted a role / work she knows she cannot do
This reduces the integrity of the person
She may let down the new organisation who are expecting her to be
able to do the work
Reference to IEEE standards in context
Or Ethical
She is taking steps to prepare for the role
« Without expecting the company to do it
Nadya may have told the company that she didn’t know the languages
but that she would learn them
Reference to IEEE standards in context
Either Ethical
The individual works as part of the team «
« therefore, the team should / will get the credit
Maria is not lying about who produced it
Reference to IEEE standards in context
Or Unethical
Maria should identify who / where the idea originated
It prevents the individual getting recognition
Maria is not being supportive of the individual
Reference to IEEE standards in context
$age
$message
allowed
6(b) Allowed 1
The (client web) browser requests the web page from the web server
The web server accesses the page (from its hard drive)
The web server processes / executes the PHP code «
« and produces the HTML for the web page // « the web server
creates the web page
The web server returns the (HTML) web page to the client web browser
MOVIE SCREEN
MOVIESCHEDULE
Answer 1:
SELECT Title, Rating
FROM MOVIE, MOVIESCHEDULE
WHERE MOVIE.MovieID = MOVIESCHEDULE.MovieID
AND MOVIESCHEDULE.ScreenNumber = 3;
Or
Answer 2:
SELECT Title, Rating
FROM MOVIE INNER JOIN MOVIESCHEDULE
ON MOVIE.MovieID = MOVIESCHEDULE.MovieID
WHERE MOVIESCHEDULE.ScreenNumber = 3;
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (NF/CGW) 144492/3
© UCLES 2018 [Turn over
MUHAMMAD ALI KHAN
PAGE 402
(a) The company creates a 4-colour bitmap image for the website as shown.
G R G K W R
G R G K W R
G R G K W R
G R G K W R
G G G K K R
W W W W K R
(i) State the minimum number of bits needed to represent each pixel in the image in part (a).
...................................................................................................................................... [1]
(ii) Calculate the minimum file size of the image shown in part (a). Show your working.
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(b) The company takes a photograph of their office to put on the website. The photograph has
a resolution of 1000 pixels by 1000 pixels. Two bytes per pixel are used to represent the
colours.
(i) Estimate the file size of the photograph in megabytes. Show your working.
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(ii) The file size of the photograph needs to be reduced before it is placed on the website.
Draw lines to link each method of reducing the file size of the image to:
Removes pixels
Crop the
photograph
Reduces number of
Lossy
pixels per inch
Use run-length
encoding
Uses fewer bits per
Lossless
pixel
Use fewer
colours
Stores colour code and
count of repetitions
[5]
(c) The company has created a logo for the website. The logo is a vector graphic.
Describe two reasons why a vector graphic is a sensible choice for the logo.
Reason 1 ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Reason 2 ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
2 Gopal types the Uniform Resource Locator (URL) of a website into a web browser.
(a) The following sequence (1 to 5) describes the steps that take place. There are three missing
statements.
2 ......................................
4 ......................................
5 ......................................
Write one of the letters A to C in the appropriate rows (2, 4 and 5) to complete the sequence.
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(c) $WHOHFRPPXQLFDWLRQVRSHUDWRUKDVLQVWDOOHGILEUHRSWLFFDEOHVLQ*RSDO·VQHLJKERXUKRRG
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
3 The following table shows assembly language instructions for a processor which has one general
purpose register, the Accumulator (ACC) and an Index Register (IX).
Instruction
Explanation
Op code Operand
LDD <address> Direct addressing. Load the contents of the location at the given address to
ACC.
LDX <address> Indexed addressing. Form the address from <address> + the contents of the
Index Register. Copy the contents of this calculated address to ACC.
LDR #n Immediate addressing. Load the number n to IX.
STO <address> Store contents of ACC at the given address.
ADD <address> Add the contents of the given address to ACC.
INC <register> Add 1 to the contents of the register (ACC or IX).
DEC <register> Subtract 1 from the contents of the register (ACC or IX).
CMP <address> Compare contents of ACC with contents of <address>.
JPE <address> Following compare instruction, jump to <address> if the compare was True.
JPN <address> Following compare instruction, jump to <address> if the compare was False.
JMP <address> Jump to the given address.
OUT Output to the screen the character whose ASCII value is stored in ACC.
END Return control to the operating system.
(a) (i) State what is meant by absolute addressing and symbolic addressing.
...........................................................................................................................................
...........................................................................................................................................
[2]
(ii) Give an example of an ADD instruction using both absolute addressing and symbolic
addressing.
(b) (i) State what is meant by indexed addressing and immediate addressing.
...........................................................................................................................................
...........................................................................................................................................
[2]
X 1 1 0 0 0 0 0 1
...................................................................................................................................... [1]
...................................................................................................................................... [1]
(iii) 7KHFRQWHQWVRI;UHSUHVHQWDWZR·VFRPSOHPHQWELQDU\LQWHJHU
...................................................................................................................................... [1]
(d) The current contents of the main memory, Index Register (IX) and selected values from the
ASCII character set are:
100 2
101 302
102 303
103 303
104 0
105 303
IX 1
Instruction
Explanation
Op code Operand
LDD <address> Direct addressing. Load the contents of the location at the given address to
ACC.
LDX <address> Indexed addressing. Form the address from <address> + the contents of the
Index Register. Copy the contents of this calculated address to ACC.
LDR #n Immediate addressing. Load the number n to IX.
STO <address> Store contents of ACC at the given address.
ADD <address> Add the contents of the given address to ACC.
INC <register> Add 1 to the contents of the register (ACC or IX).
DEC <register> Subtract 1 from the contents of the register (ACC or IX).
CMP <address> Compare contents of ACC with contents of <address>.
JPE <address> Following a compare instruction, jump to <address> if the compare was True.
JPN <address> Following a compare instruction, jump to <address> if the compare was False.
JMP <address> Jump to the given address.
OUT Output to the screen the character whose ASCII value is stored in ACC.
END Return control to the operating system.
Complete the trace table for the given assembly language program.
[7]
10
4 A student has written the steps of the fetch stage of the fetch-execute (FE) cycle in register transfer
notation. The student has made some errors.
Line 2 PC PC + 1
Line 4 CIR PC
(a) Identify the line numbers of three errors that the student has made. Write the correct notation
for each error.
[3]
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(ii) Explain how interrupts are handled during the fetch-execute cycle.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [5]
© UCLES 2018 9608/12/O/N/18
MUHAMMAD ALI KHAN
PAGE 411
11
Bus Description
Control bus
Unidirectional
(one direction)
Address bus
Bidirectional
(two directions)
Data bus
[2]
5 This question presents three scenarios. For each scenario, tick () one box to show whether you
WKLQNWKHSHUVRQ·VEHKDYLRXULVHWKLFDORUXQHWKLFDO-XVWLI\\RXUFKRLFH
(a) Wendy is a software engineer who is developing a program for her company. Her friend,
Noah, is developing a program for a different company. Wendy looks at the code that Noah is
writing to get ideas for her own program.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
12
(b) Amit is fixing some bugs in the computer system of a large multinational company. He is
asked to sign a confidentiality agreement. He sees some confidential information which
contains the names of other multinational companies that have broken the law. He copies this
information and releases it on the Internet.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(c) Farah is providing a company with an estimate for the cost of writing a program. The company
she works for is in financial difficulty so she increases the estimate by 10%.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(a) Kim needs to make sure the program is secure against unauthorised access. She has already
set up a username and password on her laptop.
Identify two additional electronic measures that Kim can use to keep the program secure.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
13
(ii) Describe one benefit and one drawback of using library routines.
Benefit ...............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Drawback ..........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(c) Kim develops her program and makes it ready for use. To do this, she uses first an interpreter
and then a compiler.
Interpreter .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Compiler ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1(a)(i) 2 1
• Number of pixels: 6 × 6 // 36
• Number of bits: Number of pixels (36) × 2 «
• « = 72 bits // 9 bytes
1(c) 1 mark per bullet point. Max 2 marks for each reason. 4
2(a) 1 mark for 1 correct answer, 2 marks for all 3 correct answers 2
Indexed addressing:
• The address to be used is formed by:
operand + the contents of the Index Register (IX)
Immediate addressing:
• The operand is not an address // the operand is the actual value to be
loaded
3(c)(i) 193 1
3(c)(ii) C1 1
3(c)(iii) –63 1
41
43 302
44
45
47 2
48 1
49 1
50 2
51
41
42
43 303
44
45
46 +
47 1
48 0
49 0
50 3
51
41
54
1 MAR m [PC]
3 MDR m [ [MAR] ]
4 CIR m [MDR]
2 PC m [PC] + 1
For example:
• Hardware fault // Example of hardware fault
• I/O request // Example of I/O request
• Program/software error // Example of software error
• End of a time-slice
Either Unethical
• Noah’s work may be confidential
• Wendy shouldn't claim someone else’s ideas / work as her own
• She is bringing the profession into disrepute
• Reference to IEEE standards in context
Or Ethical
• The code could be open source
• Wendy may have permission from Noah
• Wendy isn’t copying the code, just getting ideas
• Reference to IEEE standards in context
Either Unethical
• Amit has a responsibility to his company
• He should have taken it to the police rather than putting it on the
Internet
• He has a signed agreement to say he will not give anything away
• Reference to IEEE standards in context
Or Ethical
• Amit is acting in the public interest
• Amit may not have actually signed the confidentiality agreement
• If acting illegally, the multinational company should be brought to justice
• Reference to IEEE standards in context
Either Ethical
• It might save people’s jobs
• Farah is acting in the best interest of her company
• Reference to IEEE standards in context
Or Unethical
• Farah has a responsibility to act in the best interest of her client
• It could give her company a bad reputation
• Reference to IEEE standards in context
6(b)(ii) 1 mark per bullet point. Max 2 for one benefit, max 2 for one drawback 4
Benefit:
• Less code needs to be written
• « saves time / saves re-inventing the wheel
Drawback:
• Compatibility issues
• « may not work with the other code/may require changing program for
it to work
6(c) 1 mark per bullet point. Max 3 marks for interpreter, max 3 marks for 4
compiler
Interpreter:
• Used during development
• Debugging is easier
• « Because errors are reported as they are found // No need to wait
until the end of the process for the error report
• « Because errors can be corrected as they are found
Compiler:
• Compiler used when development complete // compiler used when
program ready for distribution
• Produces an executable file (.exe)
• « After compilation the compiler does not need to be present for the
program to run
• « The program can be given to others without access to (source) code
• « Final program does not need to be re-compiled each time it is run
• Cross-compilation, the program can be compiled to run on different
platforms
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC/SW) 144491/4
© UCLES 2018 [Turn over
MUHAMMAD ALI KHAN
PAGE 426
(a) The designer creates a 6-colour bitmap image for the poster as shown.
R R P P P G
B R R P G G
B W B B O O
B W W P P O
B B R P G O
B R R P G O
(i) State the minimum number of bits needed to represent each pixel in the image in part (a).
.......................................................................................................................................[1]
(ii) Calculate the minimum file size of the image shown in part (a). Show your working.
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(b) (i) The designer takes a photograph to put on the poster. The photograph has a resolution of
50 000 pixels by 50 000 pixels. The colours are represented using 4 bytes per pixel.
Estimate the file size of the photograph in gigabytes. Show your working.
Working ..............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(ii) The photograph needs to be sent by email but the file size is too big. It needs to be
compressed.
The table lists several methods of making an image file size smaller.
Tick () one box on each row to indicate whether each method is lossy or lossless.
[4]
(c) Explain how run-length encoding would compress the image in part (a).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
2 The following table shows assembly language instructions for a processor which has one general
purpose register, the Accumulator (ACC) and an Index Register (IX).
Instruction
Explanation
Op code Operand
Direct addressing. Load the contents of the location at the given address
LDD <address>
to ACC.
Indexed addressing. Form the address from <address> + the contents of
LDX <address>
the Index Register. Copy the contents of this calculated address to ACC.
LDR #n Immediate addressing. Load the number n to IX.
STO <address> Store contents of ACC at the given address.
ADD <address> Add the contents of the given address to ACC.
INC <register> Add 1 to the contents of the register (ACC or IX).
DEC <register> Subtract 1 from the contents of the register (ACC or IX).
CMP <address> Compare contents of ACC with contents of <address>.
Following compare instruction, jump to <address> if the compare was
JPE <address>
True.
Following compare instruction, jump to <address> if the compare was
JPN <address>
False.
JMP <address> Jump to the given address.
OUT Output to the screen the character whose ASCII value is stored in ACC.
END Return control to the operating system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
X 1 1 1 1 0 0 1 0
.......................................................................................................................................[1]
.......................................................................................................................................[1]
(iii) 7KHFRQWHQWVRI;UHSUHVHQWDWZR·VFRPSOHPHQWELQDU\LQWHJHU
.......................................................................................................................................[1]
(iv) Show the result on the general purpose register (X) after the following instruction is run.
INC X
[1]
(c) The current contents of the main memory, Index Register (IX) and selected values from the
ASCII character set are provided with a copy of the instruction set.
Complete the trace table for the given assembly language program.
[7]
3 This question presents three scenarios. Tick () one box for each scenario to indicate whether
\RXWKLQNWKHSHUVRQ·VEHKDYLRXULVHWKLFDORUXQHWKLFDO-XVWLI\\RXUFKRLFH
(a) Mason is using his work computer to book a holiday whilst at work.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Ethan is supervising a trainee. The trainee asks Ethan for a reference for another job. Ethan
does not want to lose the trainee, so refuses to give him a reference.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) Margarita finds that one of her team members has produced some inventive code. She
presents this to her manager, praising the individual by name.
Ethical
Unethical
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
4 Ava needs to view a website and she knows the Uniform Resource Locator (URL).
1 ..................................................
3 ..................................................
4 ..................................................
1 .........................................................................................................................................
...........................................................................................................................................
2 .........................................................................................................................................
...........................................................................................................................................
[2]
1 .........................................................................................................................................
...........................................................................................................................................
2 .........................................................................................................................................
...........................................................................................................................................
[2]
10
Tick () one box in each row to identify whether each description applies to a public or private
IP address.
11
5 Arnold is a software developer. He has created a computer game for people to download over the
Internet. Arnold is considering releasing the game as a piece of commercial software.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Name and describe one other type of licence that Arnold can consider using.
Description .........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(b) Users need to enter their name and email address to create an account. The information is
VWRUHGLQDGDWDEDVHRQ$UQROG·VFRPSXWHU
Give threeZD\VWKDW$UQROGFDQHQVXUHXVHUV·GHWDLOVDUHNHSWVHFXUH
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
12
(a) The stages in the FE cycle are shown in register transfer notation.
MAR [...............]
PC PC + 1
............... [ [MAR] ]
............... [MDR]
Write the missing register names in the spaces in part (a). [3]
...........................................................................................................................................
.......................................................................................................................................[1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) There are two types of RAM: dynamic RAM (DRAM) and static RAM (SRAM).
The following table shows five statements about DRAM and SRAM.
Tick () one box in each row to indicate whether the statement applies to DRAM or SRAM.
Does not need to be refreshed as the circuit holds the data while the power
supply is on
13
7 The network manager of a Local Area Network (LAN) has replaced the Ethernet cables with a
wireless network.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
...................................................................................................................................................
...............................................................................................................................................[1]
14
B X
[4]
(b) Complete the truth table for the logic expression in part (a).
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1(a)(i) 3 1
• Number of pixels: 6 × 6 = 36
• Number of bits: Number of pixels (36) × 3
• 108ௗbitsௗ/ௗ13.5ௗbytes
Relative addressing:
• A number (the offset) is added to the base address to give the actual
address
Indexed addressing:
• The contents of the index register are added to operand to give the actual
address
2(b)(i) 242 1
2(b)(ii) F2 1
2(b)(iii) –14 1
2(b)(iv) 1 1 1 1 0 0 1 1 1
20 8
21
22
23 453
24
25
26 &
27 8
28 9
29 9
30 9
31
21
22
23 452
24
25
27 9
28 10
29 10
30 10
31
21
22
32
Or Unethical
Or Unethical
1 C
2 URL goes to Domain Name Service (DNS)
3 B
4 A
5 DNS returns IP address to client
• Restricted use
• Source code not provided // source code protected
• Anyone can purchase/download if agree to the terms
• Limited number of installations allowed // Software key needed to install
Either
Open Source
• The source code is released with the program
• Users can change / edit the source code to enhance the game
• Users can re-release the game under the same terms // the game might
spread more easily
Or
Shareware
• Users get free trial or limited access for set time
• Users do not have access to the source code // source code may not be
edited
• At end of trial period, users may have to pay or register to continue using
the game // Can get people ‘hooked’ and then charge a fee
Or
Freeware
• There is no fee for the game
• The game could be copyrighted
• Modification, re-distribution or reverse engineering of the game without
permission is prohibited
• Firewall / proxy
• Encryption
• Username and Password
• Physical security
• Biometric authentication // by example
• Two-step authentication // by example
• Anti-malware
• Easier to hack
• Interference
• Signal degrades quickly
8(a) 1 mark for each logic gate with the correct inputs 4
Working Space
A B C X
0 0 0 1
0 0 1 1
0 1 0 1
0 1 1 1
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 0
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC) 163548/3
© UCLES 2019 [Turn over
MUHAMMAD ALI KHAN
PAGE 450
Circle either Valid or Invalid to indicate whether each address is valid or invalid. Explain your
decision.
Explanation ...............................................................................................................................
...................................................................................................................................................
Explanation ...............................................................................................................................
...................................................................................................................................................
Explanation ...............................................................................................................................
...................................................................................................................................................
[3]
(b) A website can be accessed using either the Uniform Resource Locator (URL) or the IP
address.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Complete the following statements by filling in the names of the missing methods of bit
streaming.
................................................. bit streaming is used when watching an event that has taken
place in the past. Existing media are encoded to bit streaming format and uploaded to a
server. It can be paused and rewound.
[2]
© UCLES 2019 9608/11/M/J/19
MUHAMMAD ALI KHAN
PAGE 451
(d) A recording of a concert is stored as a file. The file is compressed using lossy compression
before it is streamed to users.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
2 A software company produces software and distributes it under different software licences.
Write the type of software licence that best fits each description. Use a different type of licence
for each description.
1. The software can be legally used, only after a fee has been paid.
2. The source code comes with the software. If the software is modified, the edited source
code must be released under the same conditions as the original software.
3. The software is free for a trial period and then a fee is requested, or expected, if the user
wants to continue to use the software.
4. The source code comes with the software. The software is free to be downloaded, edited,
and distributed, possibly without restriction.
(b) The software company stores information about customers and the software licences they
have purchased. The company considers a file-based approach for the storage and retrieval
of data.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(ii) The software company decides to use a database to overcome the limitations of a
file-based system. Some of these limitations are addressed through the logical schema.
Name 1 ..............................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
Name 2 ..............................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
[4]
CUSTOMER(CustomerID, CompanyName)
(i) Identify the type of relationship that exists between the tables CUSTOMER and LICENCE.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Describe how the relationship is created between the tables CUSTOMER and LICENCE.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(iii) The company needs a list of all software licences that have an expiry date on or before
31/12/2019.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(i) State one benefit of Kimmy using an interpreter during the development of the program.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) State three benefits of Kimmy using a compiler when the program is complete.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(a) Two principles of the ACM/IEEE Software Engineering Code of Ethics are:
Name and describe three other principles in the ACM/IEEE Software Engineering Code of
Ethics.
Principle 1 .................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Principle 2 .................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Principle 3 .................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
(b) The software development company uses data backup and disk-mirroring to keep their data
secure.
Explain how data backup and disk-mirroring allow the company to recover from data loss.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Disk-mirroring ...........................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2019 9608/11/M/J/19
MUHAMMAD ALI KHAN
PAGE 457
(a) The table contains some of the tasks performed by a two-pass assembler.
Tick () one box in each row to indicate whether the task is performed at the first or second
pass. The first row has been completed for you.
(b) 7KHSURFHVVRU·VLQVWUXFWLRQVHWFDQEHJURXSHGDFFRUGLQJWRWKHLUIXQFWLRQ)RUH[DPSOHRQH
group is modes of addressing.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
10
(c) The table shows assembly language instructions for a processor which has one general
purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Explanation
Op code Operand
LDM #n Immediate addressing. Load the denary number n to ACC.
Direct addressing. Load the contents of the location at the given address to
LDD <address>
ACC.
Indexed addressing. Form the address from <address> + the contents of the
LDX <address>
Index Register. Copy the contents of this calculated address to ACC.
LDR #n Immediate addressing. Load the denary number n to IX.
STO <address> Store contents of ACC at the given address.
ADD <address> Add the contents of the given address to ACC.
INC <register> Add 1 to the contents of the register (ACC or IX).
CMP #n Compare contents of ACC with denary number n.
JPE <address> Following a compare instruction, jump to <address> if the compare was True.
JPN <address> Following a compare instruction, jump to <address> if the compare was False.
JMP <address> Jump to the given address.
OUT Output to screen the character whose ASCII value is stored in ACC.
END Return control to the operating system.
The current contents of the main memory, Index Register (IX) and selected values from the
ASCII character set are:
IX 0
© UCLES 2019 9608/11/M/J/19
MUHAMMAD ALI KHAN
PAGE 459
11
Trace the program currently in memory using the following trace table. The first instruction
has been completed for you.
65 67 69 69 68 33 0
20 0
[8]
3A.21.2H.1 Invalid
H is not a valid hexadecimal digit
299.53.2.2 Invalid
299 is not in the correct range
192.2.1.0 Valid
Consists of four numbers in the range 0–255 separated by
full stops
Real-time
On-demand
Data is lost
The decompressed file is not the same as the original
Commercial Licence
Free Software Licence
Shareware Licence
Open Source Licence
2(b)(ii) 1 mark for each correct name, 1 mark for each matching description, max 2 4
marks per level
External
The individual’s view(s) of the database
Conceptual
Describes the data as seen by the applications making use of the
DBMS
Describes the ‘views’ which users of the database might have
Physical / Internal
Describes how the data will be stored on the physical media
Logical
Describes how the relationships will be implemented in the logical
structure of the database
3(a)(i) 1 mark for each advantage, 1 mark for a valid expansion to max 2 2 4
Product
Software engineers shall ensure that their products and related
modifications meet the highest professional standards possible.
Judgement
Software engineers shall maintain integrity and independence in their
professional judgement.
Management
Software engineering managers and leaders shall subscribe to and
promote an ethical approach to the management of software
development and maintenance.
Profession
Software engineers shall advance the integrity and reputation of the
profession consistent with the public interest.
Colleagues
Software engineers shall be fair to and supportive of their colleagues.
Self
Software engineers shall participate in life-long learning regarding the
practice of their profession and shall promote an ethical approach to the
practice of the profession.
Data backup
A copy of data will have been made and stored elsewhere.
If the original is lost, the backup can be used to restore the data.
Disk-mirroring
The data is stored on two disks simultaneously.
If the first disk drive fails, the data is accessed from the second disk.
5(a) 1 mark for two correct ticks, 2 marks for three correct ticks 2
Data movement
Input and output of data
Arithmetic operations
Jump instructions
Compare instructions
Memory address
Instruction
IX OUTPUT
address ACC 100 101 102 103 104 300 301
65 67 69 69 68 33 0
20 0
21 0
22
23
28 65
29 A
30 0
31 1
32 1
33 1
34
35
22
24 67
25 100
26 d
27
30 1
31 2
32 2
33 2
34
36
The data from a single frame is split into two separate fields
One field has data for the odd numbered rows/lines and the other field
has data for the even numbered rows/lines
Odd numbered line fields alternate with even numbered line fields
The viewer sees data from two frames simultaneously
Sample rate:
Increasing the sample rate means more samples per second hence
more bits per second and larger file size
Decreasing the sample rate means fewer samples per second hence
fewer bits per second and smaller file size
Sample resolution:
A higher sampling resolution means more bits per sample and a larger
file size
A lower sampling resolution means fewer bits per sample. a smaller file
size
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC) 163549/4
© UCLES 2019 [Turn over
MUHAMMAD ALI KHAN
PAGE 468
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
..................................................................................................................................... [1]
(iii) $FRPSXWHU·V,3YDGGUHVVLV
&$$$$
Explain why this IPv6 address would be an invalid IPv4 address.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(b) A company has computers in two separate buildings that communicate using the Internet
over a Public Switched Telephone Network (PSTN).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) The company wants to install a dedicated line between the two buildings.
Identify one benefit and one drawback of installing a dedicated line between the two
buildings.
Benefit ...............................................................................................................................
...........................................................................................................................................
Drawback ..........................................................................................................................
...........................................................................................................................................
[2]
© UCLES 2019 9608/12/M/J/19
MUHAMMAD ALI KHAN
PAGE 469
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
...........................................................................................................................................
..................................................................................................................................... [1]
State two benefits of Biyu using an interpreter instead of a compiler while writing the
program.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
..................................................................................................................................... [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
01 MAR [PC]
02 PC [PC] - 1
03 MDR [MAR]
04 CIR [MAR]
Identify the line number of each error and give the correction.
Correction .................................................................................................................................
Correction .................................................................................................................................
Correction .................................................................................................................................
[3]
(b) $SURFHVVRU·VLQVWUXFWLRQVHWFDQEHJURXSHGDFFRUGLQJWRWKHLUIXQFWLRQ)RUH[DPSOHRQH
group is the input and output of data.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(c) The following table shows assembly language instructions for a processor which has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Explanation
Op code Operand
LDM #n Immediate addressing. Load the denary number n to ACC
Direct addressing. Load the contents of the location at the given address to
LDD <address>
ACC
Indexed addressing. Form the address from <address> + the contents of the
LDX <address>
Index Register. Copy the contents of this calculated address to ACC
LDR #n Immediate addressing. Load the denary number n to IX
STO <address> Store contents of ACC at the given address
ADD <address> Add the contents of the given address to ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP #n Compare contents of ACC with denary number n
JPE <address> Following a compare instruction, jump to <address> if the compare was True
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
OUT Output to the screen the character whose ASCII value is stored in ACC
END Return control to the operating system
The current contents of the main memory, Index Register (IX) and selected values from the
$6&,,FKDUDFWHUVHWDUH
IX 0
© UCLES 2019 9608/12/M/J/19
MUHAMMAD ALI KHAN
PAGE 473
Trace the program currently in memory using the following trace table.
The first instruction has been completed for you.
2 5 0 4 64 0
50 0
[8]
(d) 7KH$6&,,FKDUDFWHUFRGHIRU¶$·LVLQGHQDU\
(i) &RQYHUWWKHGHQDU\$6&,,FKDUDFWHUFRGHIRU¶$·LQWRELWELQDU\
[1]
(ii) &RQYHUWWKHGHQDU\$6&,,FKDUDFWHUFRGHIRU¶$·LQWRKH[DGHFLPDO
..................................................................................................................................... [1]
(iii) 7KH8QLFRGHFKDUDFWHUFRGHIRU¶*·LVLQKH[DGHFLPDO
6WDWHLQKH[DGHFLPDOWKH8QLFRGHFKDUDFWHUFRGHIRU¶'·
..................................................................................................................................... [1]
4 Shazia is creating a computer program that will be released to the public. The program includes a
video.
(a) Shazia uses a microphone to record a sound track for the video.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(ii) The script for the sound track is printed using a laser printer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
10
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Shazia does not want to release the software as open source.
Explain why Shazia does not want to use an open source licence.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(iii) Name and describe two software licences, other than open source that Shazia could
use.
Licence 1 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Licence 2 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
11
(a) Moheem has been told a relational database addresses some of the limitations of a file-based
approach by reducing data redundancy.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Explain how a relational database can help to reduce data redundancy.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(b) Moheem uses a Database Management System (DBMS) to ensure the security and integrity
of the data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
Feature 1 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Feature 2 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
© UCLES 2019 9608/12/M/J/19 [Turn over
MUHAMMAD ALI KHAN
PAGE 478
12
(iii) The DBMS provides software tools for the database developer.
Fill in the names of the missing software tools in the following statements.
13
6 (a) 'UDZDORJLFFLUFXLWWRUHSUHVHQWWKHORJLFH[SUHVVLRQ
B X
[5]
(b) Complete the truth table for the logic expression in part (a).
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
e.g. 192.168.0.1
The number of IP addresses needed will exceed the number available using
IPv4.
Benefit
• (Probably) faster connection / communication / transmission of data
• (Usually) more consistent transmission speed
• Improved security
Drawback
• Expensive to set-up / maintain
• Disruption to the dedicated line would leave no alternative
1(c) 1 mark per bullet point to max 4, max 3 for router, max 3 for gateway 4
Only award the repeated bullet points (1 to 5 in each section) once
Router:
• Connects two (or more) networks
• Can connect a network to a WAN // acts as the single access point
for«
• Receives packets and forwards towards the destination
• «using the IP address of the destination
• Assigns private IP addresses
• Operates between similar networks // networks using the same protocol
• Can be used to segment a network
Gateway:
• Connect two (or more) networks
• Can connect a network to a WAN // acts as the single access point
for«
• Receives packets and send packets towards the destination
• «using the IP address of the destination
• Assigns private IP addresses
• Connects two dissimilar networks // networks that use different
protocols
1(d) 1 mark per bullet point to max 3 for any valid answer 3
For example:
• File server
• Print server
• Proxy server
• Web server
• Application server
• Easier de-bugging
• «because errors can be corrected in real time
• The effect of any change made to the code can be seen immediately
• Parts of the program can be tested, without all the program code being
available
Assembler
• The code is already written so the programmer is not starting over again
which saves time
• The code will have been used by many people so it should be already
thoroughly tested and relatively error-free / won’t need re-testing
• The programmer can use e.g. mathematical / graphics functions etc.
that he may not know how to code
• Use of named library functions can simplify the program and make it
easier to read
• The library routine code should conform to industry standards and
therefore contribute towards a more robust program
• Data movement
• Arithmetic operations
• (Unconditional and conditional) jump instructions
• Compare instructions
• Modes of addressing
0100 0001
41
0044
• Stores all the scan lines for an entire frame // displays / records all the
frame data at the same time // not split into fields
• Complete frames are displayed in sequence
• The rate of picture display is the same as the frame rate.
Commercial Software
• The program is purchased for a fee
• It restricts the number of users/possible time period for use // Limited
number of installations allowed // Software key needed to install
• Source code not provided // source code protected / cannot be edited
• Anyone can purchase/download if agree to the terms
Shareware
• The program is free for a trial period // The (free) program may have
limited functionality // Need to purchase / enter details after trial
• Users do not have access to the source code // source code may not be
edited
• Users may re-distribute the software.
Freeware
• There is no charge for the software
• The software could still be copyrighted
• She can set her own restrictions on what a user can do with the
program
• Security ensures that data is safe from unauthorised access // safe from
loss
• Integrity ensures that data is accurate / consistent / up to date
For example:
• Access rights // User accounts
• Restrict actions (e.g. read / read-write) of specific users // unauthorised
users cannot access the database
• Views
• Restrict which parts of the database specific users can see
• Automatic Backup
• Create regular copies of data in case of loss
• Encryption
• Data is incomprehensible to unauthorised users
• Query Processor
• Developer Interface
A B C Working Space X
0 0 0 0
0 0 1 0
0 1 0 1
0 1 1 0
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 1
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC) 163550/3
© UCLES 2019 [Turn over
MUHAMMAD ALI KHAN
PAGE 492
(a) The following table lists key management tasks performed by an operating system and
their descriptions.
Complete the table by writing the missing management task names and descriptions.
Memory management
Provision of a software
platform
[4]
(b) A hard disk formatter and a hard disk defragmenter are two examples of utility software.
(i) Describe the actions performed by a hard disk formatter and a hard disk defragmenter.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(ii) Identify three other examples of utility software that can be installed on the computer.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Describe two non-physical methods used to improve the security of computer systems.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
(c) A computer uses parity blocks to check the data that has been received is the same as the
data that has been transmitted.
Parity
Data
bit
1 1 1 1 0 0 0 1
0 0 0 0 1 1 1 0
1 1 0 1 1 0 0 1
Parity
1 1 0 1 1 0 0 1
byte
(i) Describe how a parity block check can identify a bit that has been corrupted during
transmission.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) Give a situation where a parity block check cannot identify corrupted bits.
...........................................................................................................................................
..................................................................................................................................... [1]
(d) One principle of the ACM/IEEE Software Engineering Code of Ethics is to always act in the
best interest of the client.
Explain how Frankie can ensure that he is acting in the best interest of his client.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(e) When the program is complete, Frankie uses a compiler to prepare the program for the client.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
3 A company uses a relational database, EMPLOYEES, to store data about its employees and
departments.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(b) Relationships are created between tables using primary and foreign keys.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
EMPLOYEE_DATA
DEPARTMENT_MANAGER DEPARTMENT
[3]
(d) Give three reasons why the EMPLOYEES database is fully normalised.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(i) Write a Data Definition Language (DDL) statement to create the EMPLOYEES database.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Write a DDL statement to define the table EMPLOYEE_DATA, and declare EmployeeID
as the primary key.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
10
(iii) Write a Data Manipulation Language (DML) statement to return the first name and last
name of all female employees in the department named Finance.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
11
(a) The op codes LDM and LDD are used to load a register. The op code LDM uses immediate
addressing, and the op code LDD uses direct addressing.
LDM #300
...................................................................................................................................................
...................................................................................................................................................
LDD 300
...................................................................................................................................................
...................................................................................................................................................
[2]
Tick () one box in each row to indicate the group each instruction belongs to.
12
(i) Give one example of a hardware interrupt and one example of a software interrupt.
Hardware ...........................................................................................................................
...........................................................................................................................................
Software ............................................................................................................................
...........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
13
(a) The images are bitmap images. A bitmap image can be made up of any number of colours.
Each colour is represented by a unique binary number.
Draw one line from each box on the left, to the correct box on the right to identify the minimum
number of bits needed to store each maximum number of colours.
1
68
2
256
127
2
8
249
9
[3]
14
(b) One of the videos has a frame rate of 40 fps (frames per second).
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) One video uses interlaced encoding, and a second video uses progressive encoding.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(c) The sound track has a sampling rate of 88.2 kHz and a sampling resolution of 32 bits.
State what is meant by a sampling rate of 88.2 kHz and a sampling resolution of 32 bits.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1(b)(i) 1 mark per bullet point to max 2 for formatter, max 2 for defragmenter 4
For example:
Backup software
File compression
Virus checker
Disk contents analysisௗ/ௗrepair
For example:
User accounts
User has a username and password Access to resources can be limited
to specific accounts
Cannot access system without valid username and passwordௗ//ௗprevents
unauthorised access to the system
Firewall
All incoming and outgoing network traffic goes through firewall
Blocks signals that do not meet requirements
Keeps a log of signals
Applications can have network access restricted
Anti-malware
Scans for malicious software
Quarantines or deletes any malicious software found
Scans can be scheduled at regular intervals
Should be kept up to date
Auditing
Logging all actions/changes to the system
In order to identify any unauthorised use
By example:
Identification of a primary key in a table
Describing that primary key in another table as a foreign key
LDM #300 The (denary) number 300 is loaded (into the register)
LDD 300 The contents of address 300 are loaded (into the
register)
For example:
Hardware interrupt
Printer out of paper
No CD in drive
Software interrupt
A running program needs input
Runtime error, e.g. division by zero
68
256
127
249
Progressive – each frame contains (all the lines for) the complete
image
Interlaced – each frame contains half the (number of lines) of the
complete image
88.2ௗkHz
The sound wave is sampled 88200 times per second
32 bits
Each sample is stored as a 32-bit binary number
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (LEG/CB) 171630/4
© UCLES 2019 [Turn over
MUHAMMAD ALI KHAN
PAGE 516
(a) The diagram has registers used in Von Neumann architecture on the left and descriptions on
the right.
Draw one line to match each register with its correct description.
Register Description
Program Counter
Stores the address of the next instruction to
be read
[4]
(b) Many components of the computer system transfer data between them using buses. One
example of a bus is an address bus.
(i) Name two other buses that exist within a computer and give the purpose of each.
Bus 1 .................................................................................................................................
Purpose .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Bus 2 .................................................................................................................................
Purpose .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(ii) State the benefit of increasing the address bus width from 16 bits to 32 bits.
...........................................................................................................................................
..................................................................................................................................... [1]
7KH SURFHVVRU·V LQVWUXFWLRQ VHW FDQ EH SXW LQWR VHYHUDO JURXSV 2QH RI WKHVH JURXSV LV
........................................................... .
[3]
(a) Aaron has a mouse and keyboard that he can use as input devices and a monitor as an
output device.
(i) Identify two additional input devices Aaron could use with his desktop computer.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(ii) Identify two additional output devices Aaron could use with his desktop computer.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(iii) Aaron needs to store a large number of applications and data on his computer. He needs
at least 50GB of secondary storage space.
Identify oneLQWHUQDOVHFRQGDU\VWRUDJHGHYLFHIRU$DURQ·VFRPSXWHU
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
(c) $DURQ·VFRPSXWHUKDVDYLUXVFKHFNHUDQGEDFNXSVRIWZDUH
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(d) Aaron creates a web page using JavaScript code and HTML tags.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
3 (a) A bank approves a customer for an account based on the criteria in the following table.
1 True
A Employed
0 False
1 True
B Self-employed
0 False
1 True
C Over 21
0 False
1 True
D Earn more than 30 000
0 False
1 True
E Another account
0 False
C X
[5]
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
4 &XVWRPHUVRIDEDQNFDQDFFHVVWKHLUDFFRXQWLQIRUPDWLRQE\ORJJLQJLQRQWKHEDQN·VZHEVLWH
(i) Describe, using the bank as an example, the key features of a client-server model.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(ii) Give two other examples of applications that can use the client-server model.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(b) 7KHEDQN·VFXVWRPHUVORJLQWRWKHZHEVLWHXVLQJDZHEDSSOLFDWLRQ
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
10
(c) The bank is upgrading its local area network (LAN) copper cables to fibre-optic cables.
(i) State two benefits to the bank of upgrading to fibre-optic cable from copper cable.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
11
(d) The bank uses a relational database, ACCOUNTS, to store the information about customers
and their accounts.
7KHGDWDEDVHVWRUHVWKHFXVWRPHU·VILUVWQDPHODVWQDPHDQGGDWHRIELUWK
The bank has several different types of account. Each account type has a unique ID number,
name (for example, regular or saving) and bonus (for example, $5.00, $10.00 or $15.00).
(DFK FXVWRPHU·V DFFRXQW KDV LWV RZQ ,' QXPEHU DQG VWRUHV WKH DPRXQW RI PRQH\ WKH
customer has in that account.
The bank creates a normalised, relational database to store the required information. There
are three tables:
• CUSTOMER
• ACCOUNT_TYPE
• CUSTOMER_ACCOUNT
(i) Write the attributes for each table to complete the database design for the bank.
CUSTOMER( .......................................................................................................................
...........................................................................................................................................
.........................................................................................................................................)
ACCOUNT_TYPE( ..............................................................................................................
...........................................................................................................................................
.........................................................................................................................................)
CUSTOMER_ACCOUNT( ......................................................................................................
...........................................................................................................................................
.........................................................................................................................................)
[3]
(ii) Identify the primary key for each table that you designed in part (d)(i).
CUSTOMER .........................................................................................................................
ACCOUNT_TYPE ................................................................................................................
CUSTOMER_ACCOUNT ........................................................................................................
[2]
(iii) Identify one foreign key in one of the tables that you designed in part (d)(i).
12
Write the correct database term in the table for each definition.
Definition Term
13
5 (a) The bit depth of an image dictates how many different colours can be represented by each
pixel.
(i) State the number of different colours that can be represented by a bit depth of 8 bits.
..................................................................................................................................... [1]
..................................................................................................................................... [1]
(b) &RQYHUWWKHGHQDU\QXPEHUïLQWRELWWZR·VFRPSOHPHQW
............................................................................................................................................. [1]
(c) (i) Convert the Binary Coded Decimal (BCD) value 0110 1001 into denary.
..................................................................................................................................... [1]
...........................................................................................................................................
..................................................................................................................................... [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
14
Tick () one box in each scenario to identify whether lossy or lossless compression should
be used. Justify your choice.
Lossy Lossless
Justification .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
Lossy Lossless
Justification .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(iii) You need to upload a video that you have created to a website.
Lossy Lossless
Justification .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Register Description
1(b)(i) 1 mark for naming, 1 mark for purpose for each bus 4
Data bus
Carries data between the processor and memory / carries data that is
currently being processed.
Control bus
Transmits signals between the control unit and the other components
The processor’s instruction set can be put into several groups. One of these
groups is data movement // input and output // arithmetic operations //
jump instructions // compare instructions // modes of addressing.
e.g.
Trackpad/touchpad
microphone
touchscreen
scanner
e.g.
printer
speakers
touchscreen
2(b) 1 mark per bullet point to max 4 for each management task, max 6 in total 6
Process management:
Manages the scheduling of processes
« allows multi-tasking / multi-processing
« ensures fair access
« handles priorities
Manages the resources the processes need
Enables processes to share information
Prevents interference between processes// resolution of conflicts
2(c) 1 mark per bullet point to max 3 for each utility program, max 4 in total 4
Virus checker:
Scans files stored on a computer system for malicious code
Scans files when they enter the system / memory stick inserted /
download etc.
Sets up a schedule for virus-checking
Isolates / quarantines / deletes viruses
Regularly updates the virus definitions
Backup software:
Creates a copy of the contents of a disk / partition. Can be set up to
automatically backup // schedules backups
Allows the user to decide what is backed up, e.g. all data // all files that
have changed since the last backup
Allows the user to set up an off-site backup
May encrypt the backup files
Restores the data if necessary
A AND C
B AND C
D OR E
(B AND C) AND (D OR E)
Final OR
A B C Working space X
0 0 0 0
0 0 1 1
0 1 0 1
0 1 1 0
1 0 0 0
1 0 1 1
1 1 0 0
1 1 1 1
4(a)(i) 1 mark per bullet point to max 3. If no application to the bank max 2 3
e.g.
Sending and receiving email
A company or school centrally storing files
Using a print server
Using a file server
All data is held on the server // All processing is performed on the server
The server only sends the results of the query to the client
The client does not have access to all the data
... which keeps the data more secure / consistent
Customers can be identified when they log in
«from a database of usernames and passwords
4(d)(ii) 1 mark for 1 or 2 correct Primary Keys, 2 marks for 3 correct Primary Keys 2
CUSTOMER: CustomerID
ACCOUNT_TYPE: AccountID
CUSTOMER_ACCOUNT: ID
Table: CUSTOMER_ACCOUNT
Foreign Key: CustomerID / AccountID
Definition Term
5(a)(i) 256 1
5(a)(ii) 78 1
5(c)(i) 69 1
Lossless:
All the data is needed // the original file is fully restored
If any data is lost, the program will not run
Probably does not require significant reduction in file size // a program
written in a high-level language is just text, so does not need much
reduction in size
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC/CB) 171631/1
© UCLES 2019 [Turn over
MUHAMMAD ALI KHAN
PAGE 538
1 (a) The diagram shows different types of software on the left, and descriptions on the right.
Operating system
Utility program
Library program
Compiler
[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
B
X
[4]
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(a) Anushka has a file-based storage system. She wants a relational database.
(i) 'HVFULEHWKHIHDWXUHVRIDUHODWLRQDOGDWDEDVHWKDWDGGUHVVWKHOLPLWDWLRQVRI$QXVKND·V
file-based system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) The relational database design needs to be normalised. The following statements
describe the three stages of database normalisation.
groups of attributes.
For a database to be in Second Normal Form (2NF), it must be in 1NF, and contain no
For a database to be in Third Normal Form (3NF), it must be in 2NF, and all attributes
(b) The normalised relational database, SPORTS_CLUB, has the following table design.
MEMBER_SESSION(MemberID, SessionID)
SESSION_TRAINER(SessionID, TrainerID)
MEMBER SESSION
MEMBER_SESSION SESSION_TRAINER
TRAINER
[2]
(ii) Anushka first needs to create the database that she has designed.
...........................................................................................................................................
..................................................................................................................................... [1]
(iii) The table shows some sample data for the table SESSION.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
(iv) Write a Data Manipulation Language (DML) script to return the first name and last name
of all members who have Peak membership type.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
5 Mica has created some software and has copyrighted it. She wants to stop other people from
copying and changing it illegally.
(a) Identify two ways Mica can prevent illegal copies of the software being installed.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Identify one way Mica can distribute the software without the source code.
...................................................................................................................................................
............................................................................................................................................. [1]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
10
6 Dominic uses a tablet computer to complete work. He records videos of his work to send to his
colleagues to watch at a later date.
(i) The table lists four devices built into the tablet.
Tick () one or more boxes for each device to identify whether it is an input device, an
output device or both.
Touchscreen
Webcam
Microphone
Fingerprint scanner
[2]
11
Letter Statement
Changes in the audio signal cause the direction of the electrical current to change.
A
This determines the polarity of the electromagnet.
Write one of the letters A to E in each appropriate row to complete the sequence.
1 ............................
2 ............................
4 ............................
5 ............................
7 ............................
[4]
12
(i) Give one reason why the tablet computer needs secondary storage.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
RAM ..........................................................................................................................................
...................................................................................................................................................
ROM .........................................................................................................................................
...................................................................................................................................................
[2]
(d) 'RPLQLF·VWDEOHWFDSWXUHVDYLGHRRI'RPLQLFWRVHQGWRRWKHUSHRSOH7KHYLGHRLVPDGHRID
sequence of images and a sound file.
(i) Describe how the images and sound are encoded into a digital form.
Images ..............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Sound ................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
© UCLES 2019 9608/12/O/N/19
MUHAMMAD ALI KHAN
PAGE 547
13
(ii) The sequence of images and the sound file create a video. This is sent over the Internet
as a video stream. The video stream can use interlaced encoding or progressive
encoding.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(e) Dominic sends his videos to his colleagues over the Internet using bit streaming.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) Circle either Real-time or on-demand to identify whether the video will be sent using
real-time or on-demand bit streaming. Justify your choice.
Real-time / on-demand
Justification .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
© UCLES 2019 9608/12/O/N/19 [Turn over
MUHAMMAD ALI KHAN
PAGE 548
14
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Disk repair:
Checks for any errors / inconsistencies / bad sectors on the disk
Resolves any errors on the disk
Retrieves files / data from a damaged disk // re-constructs directory //
recovers disc when data corrupt
Marks bad sectors on the disk // marks bad sectors as unusable
A B C Working space X
0 0 0 1
0 0 1 1
0 1 0 1
0 1 1 1
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 0
multiply
addition
value1
3(b) 100 1
4(a)(i) 1 mark per bullet point, max 3 marks from any group to max 4 4
For a database to be in Third Normal Form (3NF), it must be in 2NF, and all
attributes must be fully dependent on the primary key.
Example 1:
CREATE TABLE SESSION(
SessionID Char(4),
Description Varchar,
SessionDate Date,
SessionTime Time,
NumberMembers Integer,
PRIMARY KEY (SessionID)
);
Example 2:
CREATE TABLE SESSION(
SessionID Char(4)NOT NULL PRIMARY KEY,
Description Varchar,
SessionDate Date,
SessionTime Time,
NumberMembers Integer);
Encryption
Assign a unique code so it will not install without this // product key
Limit the number of times that version of the software can be installed
Set a time limit within which the software must be installed
5(b) Provide an .exe file // Compile the source code // Use a compiler 1
So that she can sell the software for a fee // make money from the software
A commercial licence prohibits unauthorised/further copies being made
and/or distributed
A commercial licence prohibits any changes to the software
Open Source
Free Software
Shareware
Freeware
Touchscreen 9 9
Webcam 9
Microphone 9
Fingerprint scanner 9
A Changes in the audio signal cause the direction of the electrical current to
change. This determines the polarity of the electromagnet.
No moving parts
Solid state memory is non-volatile
Images
The images are stored as bitmaps
Each image is made up of pixels
« each pixel is of a single colour
Each colour has a unique binary number
Store the sequence of binary numbers for each image / frame // store the
binary value of each pixel
Sound
Measure the height/amplitude of the sound wave
A set number of times per second // at regular time intervals
Each amplitude has a unique binary number
Store the sequence of binary numbers for each sample
6(d)(ii) 1 mark per bullet point max 2 for each coding term. 4
Interlaced encoding
The data from a single frame are encoded as two separate fields
One containing the data for the even numbered rows / lines and the other
has the data for the odd numbered rows / lines
The image is rendered by alternating between the even field and the odd
field of each successive frame
The viewer sees data from two frames simultaneously
The rate of picture display (the field rate) is twice the rate of image frame
display (the frame rate)
Produces what appears to the eye to be a high refresh rate
Halves the transmission bandwidth requirements
Progressive encoding
Stores the data for an entire frame
Displays all the frame data at the same time
The rate of picture display is the same as the frame rate
High bandwidth requirements
Temporal Redundancy
Pixels in a sequence of consecutive video frames have the same value in
the same location
Spatial Redundancy
A sequence of consecutive pixels in a single video frame have the same
value
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (SC/TP) 171632/4
© UCLES 2019 [Turn over
MUHAMMAD ALI KHAN
PAGE 560
1 In a supermarket, a self-checkout machine allows customers to scan the barcodes of products and
then pay for their shopping. These are an alternative to the traditional cashier-staffed checkout.
(i) Identify two other input devices that self-checkout machines have.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(ii) Identify two other output devices that self-checkout machines have.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
Write one of the letters A to D in each appropriate row to complete the sequence.
1 ............................
3 ............................
4 ............................
6 ............................
[2]
(i) Give two reasons why the self-checkout machine needs primary storage.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(ii) The self-checkout machines use Static RAM (SRAM) for their cache.
The following table has statements about SRAM or Dynamic RAM (DRAM).
Tick () one box in each row to identify whether the statement is about SRAM or DRAM.
(c) The self-checkout machines connect to a server that stores all the data for the supermarket.
This is a client-server network.
(i) Describe, using an example for the supermarket, the client-server network model.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) The supermarket is concerned about the security and integrity of the data on the server.
Identify two methods that can be used to minimise the security risk to the data, and one
method to protect the integrity of the data.
Security 1 ..........................................................................................................................
...........................................................................................................................................
Security 2 ..........................................................................................................................
...........................................................................................................................................
Integrity .............................................................................................................................
...........................................................................................................................................
[3]
2 /HRQDUGR·VPRELOHSKRQHKDVDQRSHUDWLQJV\VWHP 26
(a) Describe the following key management tasks that the mobile phone operating system carries
out.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
(i) Describe how sound sampling is used by the mobile phone to encode the sound.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Leonardo records his voice twice. Each recording is the same length and has the same
sampling resolution.
The first recording has a sampling rate of 44 100 Hz. The second recording has a
sampling rate of 21 000 Hz.
Describe how the different sampling rates will affect the recording and the sound file.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(iii) Leonardo transfers the recordings to his laptop computer. He uses sound editing
software to delete some sections of the recordings, and copy and paste to replicate other
sections.
Describe two other features of sound editing software Leonardo can use to edit the
recordings.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(a) The hotel has two types of room: double and family. Each room has a unique room number.
The hotel stores information about the customers including their name, address and contact
details.
When a customer books a room, they give the start date and the number of nights they want
to stay. If a customer wants more than one room, each room must have a separate booking.
Each booking has an ID number.
The hotel creates a normalised, relational database to store the required information. There
are three tables:
• CUSTOMER
• ROOM
• BOOKING
(i) Complete the database design for the hotel by writing the attributes for each table.
CUSTOMER( .......................................................................................................................
...........................................................................................................................................
........................................................................................................................................ )
ROOM( ...............................................................................................................................
...........................................................................................................................................
........................................................................................................................................ )
BOOKING( .........................................................................................................................
...........................................................................................................................................
........................................................................................................................................ )
[3]
(ii) Identify the primary key for each table that you designed in part (a)(i).
CUSTOMER .........................................................................................................................
ROOM ..................................................................................................................................
BOOKING ...........................................................................................................................
[2]
(iii) Identify one foreign key in the tables that you designed in part (a)(i).
(b) The hotel wants to use a Database Management System (DBMS) to set up and manage the
database.
Describe, using examples, how the hotel can use the following DBMS tools:
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[5]
Tick () one box in each row to identify whether the script is an example of a Data Definition
Language (DDL) statement or a Data Manipulation Language (DML) statement.
4 (a) Convert the unsigned binary number 0101 1111 1100 into denary.
............................................................................................................................................. [1]
(b) &RQYHUWWKHGHQDU\QXPEHUïLQWRELWWZR·VFRPSOHPHQW
............................................................................................................................................. [1]
(c) &RQYHUWWKHWZR·VFRPSOHPHQWQXPEHULQWRGHQDU\
............................................................................................................................................. [1]
(d) Convert the Binary Coded Decimal (BCD) value 0110 0101 into denary.
............................................................................................................................................. [1]
............................................................................................................................................. [1]
10
B X
[5]
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
14
Complete the table by writing the name of the addressing mode for each description.
Form the address by adding the given number to a base address. Load
the contents of the calculated address to the Accumulator (ACC).
Load the contents of the address held at the given address to ACC.
Form the address from the given address + the contents of the Index
Register. Load the contents of the calculated address to ACC.
[5]
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
the specific content of the mark scheme or the generic level descriptors for the question
the specific skills defined in the mark scheme or in the generic level descriptors for the question
the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
marks are awarded when candidates clearly demonstrate what they know and can do
marks are not deducted for errors
marks are not deducted for omissions
answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
e.g.
Barcode scanner / Infra-red scanner
Pressure sensor
RFID / chip reader
Bank note scanner
Pin / key pad
Magnetic strip reader
e.g.
Speaker
Printer
LCD screen
1(a)(iii) 1 mark for at least two statements in the correct position, 2 marks for all 2
four statements in correct position.
1(b)(ii) 1 mark for at least one correct row, 2 marks for all three correct rows 2
1(c)(i) 1 mark per bullet point to max 3 plus 1 mark for suitable example 4
1(c)(ii) 1 mark for each security method to max 2, 1 mark for integrity 3
Security
encryption
access rights
username and password // biometrics // user accounts
backup // disk mirroring
firewall
Physical methods (e.g. CCTV, locked rooms etc.)
Integrity
checksum
parity
validation on input
2(a) 1 mark per bullet point to max 4 for each management task, max 6 in total 6
Process Management
Manages the scheduling of processes
« allows multi-tasking / multi-processing
« ensures fair access
« handles priorities
Manages which resources the processes require
Enables processes to share information
Prevents interference between processes // resolution of conflicts
Memory Management
Allocates memory to processes
Ensures fair usage of memory
Organises memory / by example
Makes use of virtual memory
Keep processes separate
To release memory when a process stops
2(b)(iii) 1 mark for naming a feature, 1 mark for description, max 2 marks for each 4
feature
e.g.
Amplify
... Increase the volume of a section of sound
Change pitch
... Increase/decrease frequency of section(s)
3(a)(ii) 1 mark for 1 or 2 correct Primary Keys, 2 marks for 3 correct Primary Keys 2
CUSTOMER: CustomerID
ROOM: RoomNumber
BOOKING: BookingID
Table: BOOKING
Foreign Key: CustomerID / RoomNumber
3(b) 1 mark per bullet point to max 2 plus 1 mark for suitable example for each 5
DBMS tool
Developer Interface
To create user friendly features e.g. forms to enter new bookings
To create outputs e.g. report of bookings on a given date
To create interactive features e.g. buttons and menus
Query processor
To create SQL/QBE queries
To search for data that meets set criteria, e.g. all bookings for next
week
To perform calculations on extracted data, e.g. number of empty rooms
tomorrow
3c 1 mark for at least two correct rows, 2 marks for all four correct rows 2
4(a) 1532 1
4(c) 101 1
4(d) 65 1
4(e) DE 1
A OR C
NOT(A OR C)
NOT B
A AND NOT B
Final OR
A B C Working space X
0 0 0 1
0 0 1 0
0 1 0 1
0 1 1 0
1 0 0 1
1 0 1 1
1 1 0 0
1 1 1 0
checkAnswer
Math.floor // floor
Math.random // random
getElementById
toString
alert
12
17 and 19
6(a)(iii) 14 1
Addressing Description
mode
INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.
INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.
DC (LEG/FC) 183147/3
© UCLES 2020 [Turn over
MUHAMMAD ALI KHAN
PAGE 580
1 A computer program makes use of data validation routines and verification of data input.
(a) Complete these two sentences about data validation and verification.
.................................................... .
2. ................................................. checks that the data entered is the same as the original. One
example is .................................................... .
[4]
(b) The program is installed on a computer system that has security measures in place to protect
its data.
.............................................................
Data are written on two or more disks simultaneously.
.............................................................
.............................................................................................
.............................................................................................
Encryption
.............................................................................................
.............................................................................................
.............................................................
A copy of the data is taken and stored in another location.
.............................................................
[3]
2 Kal teaches Computer Science and uses different devices when teaching his students.
(a) Tick () one or more boxes on each row to indicate whether each device is an input device,
an output device, or both.
LCD monitor
Microphone
Keyboard
Touchscreen
[2]
The following five statements are used to complete the sequence of steps.
Write one of the letters A, B, C, D or E in the appropriate step to complete the sequence.
2. .....................................
3. .....................................
5. .....................................
6. .....................................
8. .....................................
RAM ..................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
ROM ..................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
4 A digital camera takes a bitmap image. The image is 2000 pixels wide by 1000 pixels high with a
colour depth of 24-bits.
(a) Calculate an estimate of the file size for the image. Give your answer in megabytes. Show
your working.
Working .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Answer .......................................................... MB
[3]
(b) A second image is taken, this time in black and white. It has the same number of pixels, but
the file size is smaller.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) The digital camera allows a user to add text to an image. The text is encoded as ASCII
values.
The table shows the ASCII denary values for five characters.
a 97
b 98
c 99
d 100
e 101
(i) Give the 8-bit binary value for the ASCII character ‘b’.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Complete the table by writing the ASCII denary value for the character ‘t’ and its
hexadecimal equivalent.
Character t
Hexadecimal value
[2]
X
B
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(b) Identify one logic gate not used in the logic circuit in part (a).
Draw the symbol for this logic gate and complete its truth table.
Symbol:
0 0
0 1
1 0
1 1
[3]
10
6 A processor has one general purpose register, the Accumulator (ACC), and an Index Register
(IX).
(a) The table gives three assembly language instructions for loading data into the ACC. It also
identifies the addressing mode used for each instruction.
(i) State the contents of the Accumulator after each of the instructions A, B and C are run.
A ........................................................................................................................................
...........................................................................................................................................
B ........................................................................................................................................
...........................................................................................................................................
C ........................................................................................................................................
...........................................................................................................................................
[3]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(b) The ACC is a general purpose register. The IX is a special purpose register.
Identify two other special purpose registers used in the fetch-execute cycle and describe
their role in the cycle.
Register 1 .................................................................................................................................
Role ..........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Register 2 .................................................................................................................................
Role ..........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2020 9608/11/M/J/20
MUHAMMAD ALI KHAN
PAGE 588
12
7 A driving school teaches people how to drive cars. The school has a relational database,
DRIVING_SCHOOL, to store information about instructors, students, lessons and the cars used by
instructors.
INSTRUCTOR_CAR(InstructorID, Registration)
(a) Give two benefits to the driving school of using a relational database instead of a flat file.
1 .................................................................................................................................................
...................................................................................................................................................
2 .................................................................................................................................................
...................................................................................................................................................
[2]
INSTRUCTOR INSTRUCTOR_CAR
LESSON CAR
STUDENT
[4]
13
(c) The table shows some sample data for the table INSTRUCTOR.
Complete the Data Definition Language (DDL) statement to create the table INSTRUCTOR.
InstructorID VARCHAR(5),
FirstName VARCHAR(15),
LastName VARCHAR(15),
DateOfBirth DATE,
Level ………………………………………………………………………… ,
………………………………………………………………………… (InstructorID)
);
[3]
(d) The table STUDENT needs an additional field to store the student’s telephone number, for
example 012-3456.
Write a Data Definition Language (DDL) statement to add the new field to the table STUDENT.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(e) Write a Data Manipulation Language (DML) statement to return the date and time of all future
lessons booked with the instructor whose InstructorID is Ins01.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
© UCLES 2020 9608/11/M/J/20 [Turn over
MUHAMMAD ALI KHAN
PAGE 590
14
(a) Describe the tasks performed by the operating system to manage the main memory in the
games console.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) The computer games are written in a high-level language. Bart does not need a compiler or
an interpreter to run the games he buys for his console.
Explain why the games run without the need for a compiler or an interpreter.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) When Bart is at work, he connects his work laptop to his employer’s Local Area Network
(LAN). The LAN has both a router and a gateway.
Give two similarities and one difference between a router and a gateway.
Similarity 1 ................................................................................................................................
...................................................................................................................................................
Similarity 2 ................................................................................................................................
...................................................................................................................................................
Difference .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
15
(a) Complete the table by writing the name of the utility program for each description.
[3]
Tick () one box on each row to indicate whether the action is an example of lossy
compression or lossless compression.
Published
Students did not sit exam papers in the June 2020 series due to the Covid-19 global pandemic.
This mark scheme is published to support teachers and students and should be read together with the
question paper. It shows the requirements of the exam. The answer column of the mark scheme shows the
proposed basis on which Examiners would award marks for this exam. Where appropriate, this column also
provides the most likely acceptable alternative responses expected from students. Examiners usually review
the mark scheme after they have seen student responses and update the mark scheme if appropriate. In the
June series, Examiners were unable to consider the acceptability of alternative responses, as there were no
student responses to consider.
Mark schemes should usually be read together with the Principal Examiner Report for Teachers. However,
because students did not sit exam papers, there is no Principal Examiner Report for Teachers for the June
2020 series.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the June 2020 series for most Cambridge
IGCSE™ and Cambridge International A & AS Level components, and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
2(a) 1 mark for first three rows, 1 mark for the touchscreen being both. 2
LCD Monitor 9
Microphone 9
Keyboard 9
Touchscreen 9 9
2(b)(ii) 1 mark per bullet point. Max 3 for RAM, max 2 for ROM 4
RAM
• Stores currently running parts of the 3D printer software
• Stores the data about the layers being printed // contents of buffer
• Stores current progress of printing
• Stores the data about the printer, e.g. Plastic levels, nozzle position
ROM
• Stores the operating software for the 3D printer // OS for the 3D printer
• Stores the boot-up/start-up instructions for the 3D printer
Character t
Hexadecimal value 74
A B C Working space X
0 0 0 0
0 0 1 1
0 1 0 1
0 1 1 0
1 0 0 1
1 0 1 1
1 1 0 0
1 1 1 0
5(b) 1 mark for name, 1 mark for symbol, 1 mark for truth table 3
• NAND
Input
Output
A B
0 0 1
0 1 1
1 0 1
1 1 0
• NOR
Input
Output
A B
0 0 1
0 1 0
1 0 0
1 1 0
C: The data in the memory location found by adding the contents of the IX to
193
• Indirect
• Relative
6(b) 1 mark for correctly naming register, 1 mark for appropriate role 4
• Program counter // PC
• Stores the address of the next instruction to be fetched
INSTRUCTOR INSTRUCTOR_CAR
LESSON CAR
STUDENT
• CREATE (line 1)
• INTEGER (line 6)
• PRIMARY KEY (line 7)
• Software will have been built using a compiler // the software is pre-
compiled
• Software is an executable file // the game is already in machine code //
the game is already set-up to run on the console
• Source code is not provided so does not need compiling/interpreting
• A Router connects two networks using the same protocol, a Gateway can
connect two networks using different protocols
INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.
INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.
DC (RW/FC) 183148/3
© UCLES 2020 [Turn over
MUHAMMAD ALI KHAN
PAGE 603
1 Samira is creating an interactive, multimedia presentation for the entrance to her hotel.
(a) The presentation will be on a device that has a resistive touchscreen for user input.
Complete the following paragraph about the basic operation of a resistive touchscreen.
the layers. When a finger touches the screen, the ...................................................... moves
point is calculated.
[4]
(b) Samira uses a computer to draw a logo for her hotel and saves it as a vector graphic. The
logo will be placed on the multimedia presentation and elsewhere, such as on signs at the
entrance of the hotel.
Samira emails the logo to a company that prints signs, and other documentation for the hotel.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(ii) State two reasons why the hotel logo is saved as a vector graphic instead of a bitmapped
graphic.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(a) Complete the table by writing the missing definitions and term about sound.
Term Definition
....................................................................................................................
....................................................................................................................
Sampling
....................................................................................................................
....................................................................................................................
......................................
The number of samples per unit time
......................................
....................................................................................................................
....................................................................................................................
Sampling resolution
....................................................................................................................
....................................................................................................................
[3]
(b) The file is too large to be emailed and the file size needs to be reduced.
(i) Name one lossless compression technique that can be used to reduce the size of the
sound file.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Describe one lossy compression technique that can be used to reduce the size of the
sound file.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(c) Amir’s computer has system software, including utility software and an operating system.
(i) Explain how the disk formatter, disk contents analysis and disk repair utilities work
together.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
Task 1 ................................................................................................................................
...........................................................................................................................................
Task 2 ................................................................................................................................
...........................................................................................................................................
Task 3 ................................................................................................................................
...........................................................................................................................................
[3]
(iii) The peripheral devices are plugged into USB ports of the computer.
Describe two benefits of connecting the peripheral devices using a USB port.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
Draw the logic circuit for the given expression using a maximum of four gates.
B X
[4]
(i) State one ethical action that Sophie can take to help her to feel more confident about
starting work.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) State two ethical actions that Sophie’s manager can take to help Sophie to feel more
confident about starting work.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(iii) State one ethical action that Sophie’s new colleagues can take to help Sophie to feel
more confident about starting work.
...........................................................................................................................................
..................................................................................................................................... [1]
(b) Explain why Sophie is asked to sign a professional code of conduct before starting work.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
The following three statements are used to complete the sequence of steps.
A If it is already in the symbol table, it checks to see if the absolute address is known
B When it meets a symbolic address, it checks to see if it is already in the symbol table
C If it is known, it is entered
Write one of the letters A, B or C in the appropriate step to complete the sequence.
2. .........................
4. .........................
5. .........................
The table shows the denary values for three assembler op codes.
(i) Convert the denary value for the op code LDD into 8-bit binary.
[1]
(ii) Convert the denary value for the op code STO into hexadecimal.
..................................................................................................................................... [1]
(iii) State why the denary value for the op code ADD cannot be represented in 8-bit two’s
complement form. Justify your answer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
10
(c) The table shows part of the instruction set for a processor. The processor has one general
purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Explanation
Op code Operand
LDM #n Immediate addressing. Load the denary number n to ACC
Direct addressing. Load the contents of the location at the given address to
LDD <address>
ACC
Indexed addressing. Form the address from <address> + the contents of the
LDX <address>
Index Register. Copy the contents of this calculated address to ACC
LDR #n Immediate addressing. Load the denary number n to IX
STO <address> Store contents of ACC at the given address
ADD <address> Add the contents of the given address to ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP <address> Compare contents of the address given with the contents of ACC
JPE <address> Following a compare instruction, jump to <address> if the compare was True
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
OUT Output to screen the character whose ASCII value is stored in ACC
END Return control to the operating system
11
Complete the trace table for the following assembly language program. The first instruction
has been completed for you.
23 LDD 100 20 0
24 ADD 101
25 STO 100
26 LDD 103
27 INC ACC
28 STO 103
29 JMP 20
30 END
100 1
101 2
102 3
103 0
[6]
© UCLES 2020 9608/12/M/J/20 [Turn over
MUHAMMAD ALI KHAN
PAGE 612
12
(a) Explain why this database is not in Third Normal Form (3NF). Refer to the tables in your
answer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Give an example from the database SOFTWARE_MANAGEMENT for each of the following
database terms.
Term Example
Entity
Foreign key
Attribute
[3]
13
(c) The company also develops computer games. They extend the relational database
SOFTWARE_MANAGEMENT by adding a new table. The new table, GAME_DEVELOPMENT,
stores details about the games and the software development teams creating them.
(i) Complete the Data Definition Language (DDL) statement to create the table
GAME_DEVELOPMENT.
GameName VarChar,
Genre VarChar,
………………………………………………………… ………………………………………………………… ,
DevelopmentStage VarChar,
ManagerID VarChar,
………………………………………………………… (GameName)
);
[5]
Complete the Data Manipulation Language (DML) statement to return the game name,
genre and team number of all games managed by the product manager with the first
name ‘James’ and the last name ‘Fitz’.
AND …………………………………………………………………………………………………
= …………………………………………………………………………………………………… ;
[3]
© UCLES 2020 9608/12/M/J/20 [Turn over
MUHAMMAD ALI KHAN
PAGE 614
14
7 A company allows customers to stream music from its servers over the Internet.
The company’s internet connection is currently provided through copper cables.
(a) Identify two pieces of hardware, other than the cables, that enable the servers to connect to
the Internet. Describe the purpose of each device.
Device 1 ....................................................................................................................................
Purpose ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Device 2 ....................................................................................................................................
Purpose ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(b) The company wants to upgrade their internet connection to fibre-optic cables.
Give one benefit and one drawback to the company of upgrading to fibre-optic cables.
Benefit ......................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Drawback ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
15
(c) A customer enters a song title into a web page to listen to the song. The design of the web
page is shown:
Company Name
Navigation Bar
Search
The web page will make use of both client-side and server-side scripting.
(i) Explain how client-side scripting will be used in this web page.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(ii) Explain how server-side scripting will be used after the customer clicks the ‘Search’
button.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
16
(d) The company needs to keep the data on its servers secure from online threats.
(i) Describe how a firewall will help to protect the data on the servers from online threats.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Give one additional security measure that the company can use to protect the data on
the servers from online threats.
..................................................................................................................................... [1]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
Students did not sit exam papers in the June 2020 series due to the Covid-19 global pandemic.
This mark scheme is published to support teachers and students and should be read together with the
question paper. It shows the requirements of the exam. The answer column of the mark scheme shows the
proposed basis on which Examiners would award marks for this exam. Where appropriate, this column also
provides the most likely acceptable alternative responses expected from students. Examiners usually review
the mark scheme after they have seen student responses and update the mark scheme if appropriate. In the
June series, Examiners were unable to consider the acceptability of alternative responses, as there were no
student responses to consider.
Mark schemes should usually be read together with the Principal Examiner Report for Teachers. However,
because students did not sit exam papers, there is no Principal Examiner Report for Teachers for the June
2020 series.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the June 2020 series for most Cambridge
IGCSE™ and Cambridge International A & AS Level components, and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
The resistive touchscreen has two layers with a gap / an air gap between the
layers. When a finger touches the screen, the top layer moves to touch the
bottom layer; this creates a point of contact.
The horizontal and vertical position of this point is calculated.
Term Definition
• Run-length encoding
• Huffman Coding
• Any other valid encoding method
Or
2(c)(iii) 1 mark for benefit, 1 mark for expansion for max 2 benefits 4
For example:
• Prepare an induction
• Invite Sophie in before starting
• Introduce Sophie to the team
• Give Sophie a mentor
• Prepare a greeting/introduction
• Provide structured support
• Invite Sophie to social event(s) before/at the start to meet people
5(a) 1 mark for one letter in the correct place, 2 marks for all three correct 2
2 B
4 A
5 C
5(b)(i) 11000010 1
5(b)(ii) CD 1
• The maximum range for an 8-bit two's complement binary number is í128
to +127
• … 200 is outside of the maximum range
1 2 3 0
20 0
21
22
23 1
24 3
25 3
26 0
27 1
28 1
29
20 1
21
22
23 3
24 5
25 5
26 1
27 2
28 2
29
20 2
21
22
30
Term Example
CustomerID
Foreign Key
(in SOFTWARE_PURCHASED table)
7(a) 1 mark for device, 1 mark for matching purpose. Max 2 devices. 4
• Router
• To connect (devices) / the servers to the Internet // to transmit data
between the servers and the Internet // to forward data towards its
destination
• Gateway
• To connect a server that uses a different protocol to the Internet // to join
two different types of network
• Modem
• To connect (the servers) to the Internet over a telephone line
7(b) 1 mark per bullet point, max 1 for benefit, max 1 for drawback 2
Benefit:
• (Consistently) faster data transmission
• More stable connection
Drawback:
• High initial cost as new hardware will be needed
• Expertise required to complete connections
INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.
INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.
DC (LEG/FC) 183149/3
© UCLES 2020 [Turn over
MUHAMMAD ALI KHAN
PAGE 627
1 Ana owns a small company with four employees. The office has a network containing several
computers that run on a client-server model. There is one server that connects to the Internet
using a router.
(a) Networks transmit data using various types of connection shown in the following table.
..................................................................................................
..................................................................................................
Fibre-optic
..................................................................................................
..................................................................................................
..................................................................................................
..................................................................................................
Radio waves
..................................................................................................
..................................................................................................
(b) Explain how the client-server model enables the employees to access the same files from
different computers.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Give two reasons why the computers do not have public IP addresses.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(a) Complete the following description of the basic internal operation of a laser printer.
RAM ..........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
ROM .........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
..................................................................................................................................... [1]
Draw the logic circuit for the given expression, using a maximum of four logic gates.
B
X
[4]
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
Identify one logic gate that would not be used in the logic circuit for this expression.
Draw the symbol for the logic gate.
[2]
(a) One of her friends has suggested using Dynamic Link Library (DLL) files to help them develop
the game.
(i) Give three reasons why Annchi and her friends should use DLL files when developing
the game.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(ii) Give two reasons why Annchi and her friends should not use DLL files when developing
the game.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(b) Each member of the group is creating a different part of the game. Each person needs to test
their part of the game independently before they are combined.
Identify the most appropriate type of translator that should be used to test each part of the
game independently. Justify your choice.
Translator ..................................................................................................................................
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
(c) Annchi needs to decide which type of software licence to use for the game.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(ii) Give one benefit to the customers of the game being released using a commercial
licence.
...........................................................................................................................................
..................................................................................................................................... [1]
(iii) Describe one benefit to the customers of the game being released using a shareware
licence.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(a) He wants to make sure the source code is secure on his laptop.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Wei wants to compress the source code to transport it to another computer.
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
10
6 Sheila creates a relational database for her hotel using a Database Management System (DBMS).
(a) Draw one line from each database term to its most appropriate description.
Primary key
A collection of records and fields
Attribute
The type of data that is being stored
[4]
(b) Identify three tasks that Sheila can perform using the DBMS developer interface.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
11
(c) Sheila creates the database HOTEL with the following table structure:
ROOM(RoomNumber, RoomType)
(i) The following table shows some sample data for the table ROOM.
RoomNumber RoomType
1 Standard
2 Double
3 Executive
4 Standard
Complete the Data Definition Language (DDL) statement to create the table ROOM.
RoomNumber Integer,
RoomType ................................................,
................................................ (RoomNumber)
);
[3]
Complete the Data Manipulation Language (DML) statement to add the details for room
number 5 to the table ROOM.
VALUES(......................................................................................................);
[2]
(iii) The table BOOKING needs an additional field to store the number of nights (for example,
3) a customer is staying.
Write a Data Definition Language (DDL) statement to add the new field to the table
BOOKING.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
© UCLES 2020 9608/13/M/J/20 [Turn over
MUHAMMAD ALI KHAN
PAGE 637
12
PJF
Interiors
(a) Describe how one typical feature of bitmapped graphics software was used to create the
logo.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) The finished logo is 160 pixels wide and 160 pixels high. The image has a colour depth of
3 bytes per pixel.
Calculate an estimate of the file size for the logo. Give your answer in kilobytes. Show your
working.
Working .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Answer ........................................................ KB
[3]
(c) Xiaoming needs to use his logo on his business card, on his website and on large display
boards. He is told that he should have created a vector graphic logo instead of a bitmapped
graphic logo.
Describe one benefit of creating a vector graphic logo instead of a bitmapped graphic logo.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
13
(d) The hexadecimal colour value of the background of Xiaoming’s website is:
913C8E
Complete the following table by converting each hexadecimal value to denary value.
Hexadecimal value 91 3C 8E
Denary value
[2]
• Improved security because the IP address is not visible outside the network
• An internet presence is not required for each employee computer
• Only the router needs a public IP address, as only the router needs to be
externally visible
• Reduces number of (public) IP addresses needed
The printer uses a laser (beam) and a rotating mirror to draw the contents of the
page on the photosensitive drum as an electrostatic charge. The toner is attracted
to this charge.
2(b) 1 mark per bullet point. Max 2 for RAM, max 2 for ROM 4
RAM
• Stores currently running parts of the printer software
• Stores the data being printed // contents of buffer
• Stores current progress of printing
• Stores the data about the printer, e.g. toner levels
ROM
• Stores the printer operating software // OS for the printer
• Stores the boot-up/start-up instructions for the printer
• Printer fonts stored in ROM
2(c)(i) 1 mark 1
2(c)(ii) 1 mark 1
• USB
• HDMI
• SCSI
• Firewire
• Ethernet
• Any other acceptable port
• A NOR B
• B XOR C
• A AND (B XOR C)
• Final OR
A B C Working Space X
0 0 0 1
0 0 1 1
0 1 0 0
0 1 1 0
1 0 0 0
1 0 1 1
1 1 0 1
1 1 1 0
3(c) 1 mark for name, 1 mark for symbol matching the name 2
NAND
NOR
Primary key
A collection of records and tables
Attribute
The type of data that is being stored
Foreign key
A unique identifier for each tuple
• Create a table
• Set up relationships between tables
• Create / design a form
• Create / design a report
• Create / design a query (NOT run a query)
7(a) 1 mark for each feature and 1 mark for further related expansion to max 2 2
• Colour select
• Select all pixels of the same colour
• Add text
• To show the name of the company
• Select
• ‘Grab’ a number of pixels to perform a task with/to
• Copy
• Replicate a number of pixels
Hexadecimal value 91 3C 8E
7(e)(i) 1 mark 1
INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.
INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.
DC (CJ) 188576/2
© UCLES 2020 [Turn over
MUHAMMAD ALI KHAN
PAGE 647
1 Draw one or more lines to link each language translator to the most appropriate statement(s).
Compiler
Needs the source code to be present
when the user’s program is run
[3]
2 A veterinary surgery cares for sick animals. The surgery has a file-based database that stores
data about the pets, their owners, and appointments made with the surgery.
(a) Explain the reasons why the surgery should upgrade their database.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(i) Give one reason why the database design for SURGERY is not in Third Normal Form
(3NF).
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) The database needs to be normalised to 3NF. A pet may have more than one owner and
an owner may have more than one pet.
The appointment table does not need to change and has been repeated below.
Give the name and attributes of three additional tables in 3NF. Identify the primary
key(s) in each table.
Table 1 ...............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Table 2 ...............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Table 3 ...............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(c) Part of the table APPOINTMENT is shown. The veterinary surgery uses Data Manipulation
Language (DML) statements to search for appointments.
(i) Identify the industry standard language that provides both DML and Data Definition
Language (DDL) statements.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Write a DDL statement to update the table APPOINTMENT and define AppointmentID
as the primary key.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(iii) Complete the DML script to display the times and Pet IDs of all appointments on
02/02/2021 with staff ID of ‘JK1’, in descending order of time.
FROM APPOINTMENT
(d) New pet owners complete a paper-based form to register their pets at the surgery.
(i) Describe two verification checks that can be carried out when the data from the paper-
based form is entered into the database.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(ii) Appointments can be booked between 09:00 and 16:50 on Monday to Friday.
Describe the ways in which the appointment date and time can be validated to make
sure they are reasonable.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(e) The surgery has five computers that can all access the database. A copy of the database is
stored centrally.
(i) Complete the description of this type of network model by filling in the missing terms.
the data for the surgery. The other computers are ......................................... . When a
(ii) The surgery wants to keep all data secure. The surgery network is not connected to the
Internet.
Identify two authentication techniques the surgery could use to restrict access to the
data.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
3 Ria manages a team of software developers. The team is creating a mobile application game for a
client.
Ria wants to ensure that her team works to the ACM/IEEE Software Engineering Code of Ethics.
(a) Explain the ways in which Ria and her team can ensure that they follow the Code of Ethics in
relation to the product and their colleagues.
(i) Product
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Colleagues
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(b) Ria’s client wants to sell the game for a profit. The client cannot decide which type of software
licence to use to distribute the game.
Identify two types of licence that Ria could recommend to her client and justify the use of
each licence.
Licence 1 ..................................................................................................................................
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Licence 2 ..................................................................................................................................
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
4 The following table shows assembly language instructions for a processor that has one general
purpose register, the Accumulator (ACC).
Instruction
Explanation
Op code Operand
Direct addressing. Load the contents of the location at the given address to
LDD <address>
ACC.
LDM #n Immediate addressing. Load the denary number n to ACC.
Indirect addressing. The address to be used is at the given address. Load
LDI <address>
the contents of this second address to ACC.
CMP <address> Compare the contents of ACC with <address>.
SUB <address> Subtract the contents of the given address from the contents of ACC.
OUT Output to screen the character whose ASCII value is stored in ACC.
JPE <address> Following a compare instruction, jump to <address> if the compare was True.
Address Instruction
100 LDD 200
101 ADD 201
102 ADD 202
103 SUB 203
104 STO 204
105 END
200 10
201 20
202 5
203 6
204
205
Tick () one box to indicate which one of the following statements is true after program
execution.
Address Instruction
100 LDM #120
101 ADD 121
102 SUB 122
103 STO 120
104 END
120 10
121 2
122 4
123 6
124 8
125 10
Tick () one box to indicate which one of the following statements is true after program
execution.
10
Address Instruction
150 LDI 200
151 ADD 200
152 ADD 201
153 STO 205
154 END
200 202
201 203
202 201
203 200
204
205
Tick () one box to indicate which one of the following statements is true after program
execution.
(d) Identify two modes of addressing that are not used in parts (a), (b) or (c).
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
11
Tick () one box on each row to indicate the appropriate instruction group for each assembly
language instruction.
STO 120
JPE 200
ADD 3
LDD 20
INC ACC
OUT
[3]
12
(a) The concert is streamed to his computer at the same time as it is taking place.
(i) Identify whether Oscar is using real-time or on-demand bit streaming. Justify your choice.
Justification .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(ii) The video of the concert repeatedly stops and restarts while Oscar is watching it on his
laptop computer. His friend is watching the same video of the concert at the same time,
in a different location, but he does not experience the same problem as Oscar.
Give three possible reasons why Oscar’s video constantly stops and starts again.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
13
(b) The video of the concert is made up of a sound track and multiple images.
Two successive frames of one section of the video are shown. The pixel colours are
represented by letters.
BL BL BL RD RD RD BL BL BL RD RD RD
K K K K K K BL BL BL RD RD RD
LG LG LG DG DG DG LG LG LG DG DG DG
Y Y K Y Y K BK BK BK BK BK BK
W K W W W DG W K W W W DG
P P P P P P P P P P P P
Frame 1 Frame 2
(i) Explain the way in which progressive encoding can be used to transmit Frames 1 and 2.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Explain, using Frames 1 and 2 as an example, the way in which temporal redundancy
can be used to compress a video.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(iii) Give another type of redundancy technique that can be used to compress a video.
...........................................................................................................................................
..................................................................................................................................... [1]
(iv) MP4, WMV and AVI are all examples of a type of format that combines sound and image
components into a video.
Identify the type of format that combines the sound and image components into a video.
...........................................................................................................................................
..................................................................................................................................... [1]
© UCLES 2020 9608/11/O/N/20 [Turn over
MUHAMMAD ALI KHAN
PAGE 659
14
6 (a) Convert the following denary number into a 12-bit two’s complement binary form.
-245
[1]
F0
...................................................................................................................................................
............................................................................................................................................. [1]
10101111
...................................................................................................................................................
............................................................................................................................................. [1]
(d) Convert the following Binary Coded Decimal (BCD) into denary.
100001010011
...................................................................................................................................................
............................................................................................................................................. [1]
15
7 Anne is downloading a sound file from a web server. She had the choice of a sampling rate of
44.1 kHz or 98 kHz before she downloaded the sound file.
Explain the differences between the two sound files stored on the server.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]
16
(a) The laptop has a private IP address. The router has both public and private IP addresses.
Explain the reasons why Joshua’s laptop has a private IP address only, but the router has
both a private and a public IP address.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Joshua visits a website by entering its Uniform Resource Locator (URL).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
...................................................................................................................................................
............................................................................................................................................. [1]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2020 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 1 mark for both compiler and interpreter linking to the sixth box (Converts a 3
high-level language program into a different form)
1 mark for the compiler having the other two correct links
1 mark for the interpreter having the other two correct links
• Privacy is improved
• … e.g. different views can be given to different users in the surgery.
E.g. the receptionists cannot see the pet’s medical notes
• More complex searches and queries can be executed … e.g. the staff in
the surgery can set up a query to only return the names of pets who
have not been seen for over a year
• Composite primary key made up of the primary keys of the other two
tables and no extra attributes in the linking table, for example,
PET_OWNER(PetID, OwnerID)
• Double entry // The data from the form is entered twice (by two different
people)
• and automatically compared
• Visual check // the data is compared (by two different people) after entry
• ... to the paper form manually
For example:
• Time can have range check to make sure it is within the opening hours
of 09:00 and 16:50
• Date can have existence check to compare against list of dates they are
open
The client-server model has one server that stores all the data for the
surgery. The other computers are clients. When a user requests data, a
request is sent to the server.
Product:
For example:
• Ensure product is of a high standard
• Ensure product meets requirements
• Ensure the product is delivered within time
• Ensure the product is delivered within budget
• Ensure product development is well-documented
• Ensure product is tested thoroughly // free of bugs
Colleagues:
For example:
• Need to be fair// do not show any prejudices
• To be supportive of colleagues
• Work together as a team
• Listen to each other’s ideas
• Assist colleagues in professional development
• Fully credit the work of other members of the team
• Make colleagues aware of expected standard ways of working
3(b) 1 mark for naming licence, 1 mark for description to max 2 per licence 4
• Commercial / proprietary...
• ...Software is sold for a fee therefore giving the client the income
• Shareware...
• ...Free for a trial period / limited features, and then users must pay for it
• Indexed
• Relative
STO 120 9
JPE 200 9
ADD 3 9
LDD 20 9
INC ACC 9
OUT 9
• If a pixel in frame 2 has the same colour value as the pixel in the same
position in frame 1 then
• …it is not necessary to send the pixel again
• For example, the first row is / rows 1, 3, 5 and 6 on both frames are the
same // only rows 2 and 4 change
• … so does not need to be replicated // only rows 2 and 4 need to be
resent
6(b) 240 1
6(c) 175 1
6(d) 853 1
• The browser parses the Uniform Resource Locator (URL) to obtain the
Domain Name
INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.
INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.
DC (KN) 188577/1
© UCLES 2020 [Turn over
MUHAMMAD ALI KHAN
PAGE 673
(i) Convert the following denary number into Binary Coded Decimal (BCD).
105
..................................................................................................................................... [1]
(ii) Convert the following two’s complement binary integer into denary.
10111111
..................................................................................................................................... [1]
AB
..................................................................................................................................... [1]
The following tables show part of the ASCII code character set.
(i) Describe how the computer uses ASCII codes to represent characters.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
Bed
...........................................................................................................................................
..................................................................................................................................... [1]
(iii) Give the denary ASCII code for the following character.
..................................................................................................................................... [1]
(a) Describe, using an example, how a text file is compressed using RLE.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Explain why run-length encoding will sometimes increase the size of a text file.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
3 (a) Complete the following statements about CPU architecture by filling in the missing terms.
The Von Neumann model for a computer system uses the ....................................... program
concept.
....................................... it.
The processor uses several ....................................... to store the data and instructions from
the program because they can be accessed faster than main memory.
[6]
(b) The following table shows assembly language instructions for a processor that has one
general purpose register, the Accumulator (ACC).
Instruction
Explanation
Op code Operand
Direct addressing. Load the contents of the location at the given address to
LDD <address>
ACC.
LDM #n Immediate addressing. Load the denary number n to ACC.
Indirect addressing. The address to be used is at the given address. Load the
LDI <address>
contents of this second address to ACC.
STO <address> Store contents of ACC at the given address.
CMP <address> Compare the contents of ACC with the contents of <address>.
OUT Output to screen the character whose ASCII value is stored in ACC.
JPE <address> Following a compare instruction, jump to <address> if the compare was True.
Following a compare instruction, jump to <address> if the compare was
JPN <address>
False.
END Return control to the operating system.
80 10
81 2
82 0
Trace the program currently in memory using the following trace table.
The first instruction has been completed for you.
10 2 0
50 10
[5]
Tick () one box in each column to identify the appropriate instruction group for each of
the three assembly language instructions.
Data movement
Arithmetic operations
Compare instructions
[3]
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(b) Describe the difference between the operation of an AND gate and a NAND gate.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
© UCLES 2020 9608/12/O/N/20
MUHAMMAD ALI KHAN
PAGE 679
5 A teacher uses a relational database, RESULTS, to store data about her students and their test
results.
(a) Describe the benefits to the teacher of using a relational database instead of a file-based
approach.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) The teacher sets up the RESULTS database using a Database Management System (DBMS).
(i) Explain the ways in which the developer interface of a DBMS will help the teacher set up
the database.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) The DBMS creates a data dictionary for the RESULTS database.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
10
(i) Complete the following table by giving one example of each database term from the
database RESULTS. Give both the field name and the corresponding table name.
Primary key
Foreign key
Attribute
[3]
(ii) Tick () one box to identify whether the database RESULTS is in 1NF, 2NF or 3NF.
Justify your choice.
Justification: ......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(iii) Complete the Data Manipulation Language (DML) script to display the Student ID, mark
and maximum marks for all tests with the topic of ‘Programming’.
11
(iv) The teacher wants to implement validation to make sure that all data entered into the
database RESULTS are reasonable.
Name three different methods of data validation that can be used in the RESULTS
database. Describe how each method will limit the data that can be entered in this
database.
Method 1 ...........................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
Method 2 ...........................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
Method 3 ...........................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
[6]
(d) The teacher stores the database on the desktop computer in her classroom.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Explain the ways in which the teacher can use data backup and disk mirroring to limit the
amount of data lost in the event of hardware failure.
Data backup
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Disk mirroring
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
© UCLES 2020 9608/12/O/N/20 [Turn over
MUHAMMAD ALI KHAN
PAGE 682
12
(a) Malika’s manager has asked her to work with a senior software engineer for the first week.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Malika researched the company and the programming languages used by the company
before she started the job.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) Malika thinks that her colleagues do not like her, so she asks her manager for help.
Describe the actions the manager could take to support Malika in an ethical way.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
13
Characteristic IP address
IPv6
[2]
Explain the reasons for the web server using a static instead of a dynamic IP address.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2020 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1(a)(ii) – 65 1
1(a)(iii) 171 1
1(b)(iii) 72 1
Stored
Memory
Fetches
Decodes
Executes
Registers
The processor fetches each instruction, decodes it and then executes it.
The processor uses several registers to store the data and instructions from
the program because they can be accessed faster than main memory.
Data movement 9
Arithmetic operations 9
Compare instructions
A B C Working space X
0 0 0 0
0 0 1 1
0 1 0 1
0 1 1 1
1 0 0 0
1 0 1 0
1 1 0 1
1 1 1 1
• Privacy is improved
• … e.g. the teacher can prevent student access to the data (using views
etc.)
For example:
• Table / entity names
• Field / attribute names
• Data types
• Validation
• Primary Keys
5(c)(iv) 1 mark for correct name and 1 mark for corresponding description applied to 6
RESULTS database. Max 2 per rule to max 3 rules
The descriptions are examples only, there are many correct answers
• Length check
• Limit the target grade to 1 character
• Range check
• The mark for each test must be between 0 and MaxMarks
• Existence check
• The test topic must be in a pre-existing list
• Presence check
• A mark must be entered / not null
• Format check
• The data for a class must be one digit followed by one letter, e.g.3A
• Type check
• The maximum marks for a test must be an integer
5(d)(ii) 1 mark per bullet point to max 3 for each, max 4 in total 4
Backup
• A copy of the RESULTS database is made
• ... at regular intervals // Sensible frequency of backups, e.g. daily, weekly
etc.
• ... and stored in a different location
• So, in the event of data loss, (most of) the original data may be
recovered.
Disk mirroring
• Data is written to different disks simultaneously
• So, in the event of hardware failure, a second identical copy is
immediately available.
For example:
• The manager is supporting her professional development
• The manager is working in the best interest of his/her colleague (Malika)
• This will ensure she is introduced to all aspects of the job
• The manager is offering appropriate support
For example:
• She is acting in her own best interest
• … by taking responsibility for her own professional development
• She is acting in the best interests of her colleagues
• … by ensuring she is up-to-date and does not need further training
For example:
• Discuss the problems with her
• Discuss the concerns with her colleagues
• Assign her a mentor who can reassure her
• Team building exercises
7(a) 1 mark for correct lines from IPv4, 1 mark for correct lines from IPv6 2
Characteristic IP address
Can use hexadecimal
notation
IPv6
Uses double colons (::)
INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.
INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.
DC (JC/CT) 188578/2
© UCLES 2020 [Turn over
MUHAMMAD ALI KHAN
PAGE 696
1 Identify the most appropriate utility program to use for each of the following tasks.
[4]
Draw one line from each term relating to videos to its correct description.
Term Description
Interlaced encoding
Image resolution
[4]
© UCLES 2020 9608/13/O/N/20
MUHAMMAD ALI KHAN
PAGE 697
3 Hannah is writing a computer program using a high-level language. She uses both a compiler and
an interpreter.
(a) Describe the ways in which Hannah will use an interpreter while writing the program.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Explain the reasons why Hannah uses a compiler when she has finished writing the program.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) Some high-level languages are partially compiled and partially interpreted.
Give one benefit and one drawback of using a language that is partially compiled and partially
interpreted.
Benefit ......................................................................................................................................
...................................................................................................................................................
Drawback ..................................................................................................................................
...................................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
Give the reasons why the laptop does not have a public IP address.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
Give three differences between the format of an IPv4 address and an IPv6 address.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(b) A Public Switched Telephone Network (PSTN) is one example of a communication system
that can be used to support the Internet.
Identify and describe two other communication systems that can be used to support the
Internet.
System 1 ...................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
System 2 ...................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
[4]
(i) Complete the following table by writing a description of the function of each line of PHP
code.
$number1 = 22;
$newValue = $_GET["number"];
[4]
...........................................................................................................................................
..................................................................................................................................... [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(a) (i) Complete the table by writing the register transfer notation for each of the descriptions.
[4]
(ii) Write one of the letters A, B, C or D (from the table above) on each row (1 to 4), to show
the correct order of the fetch-execute cycle.
1 ................................
2 ................................
3 ................................
4 ................................
[2]
(b) Buses are used to transfer data between various components of the computer system.
Tick () one or more boxes on each row to identify the bus(es) each statement describes.
(c) The following table shows assembly language instructions for a processor that has one
general purpose register, the Accumulator (ACC).
Instruction
Explanation
Op code Operand
INV Input a denary value from the keyboard and store it in ACC.
LDD <address> Direct addressing. Load the contents of the location at the given address to ACC.
LDM #n Immediate addressing. Load the denary number n to ACC.
Indirect addressing. The address to be used is at the given address. Load the
LDI <address>
contents of this second address to ACC.
ADD <address> Add the contents of the given address to ACC.
OUT Output to screen the character whose ASCII value is stored in ACC.
INC <register> Add 1 to the contents of the register (ACC or IX).
CMP <address> Compare the contents of ACC with the contents of <address>.
JPE <address> Following a compare instruction, jump to <address> if the compare was True.
JPN <address> Following a compare instruction, jump to <address> if the compare was False.
STO <address> Store contents of ACC at the given address.
END Return control to the operating system.
(i) The assembly language instructions are grouped according to their function.
Write one example of an op code from the table of instructions for each of the following
groups.
Arithmetic ............................................................
Address Instruction
500 INV
501 STO 901
502 INV
503 STO 900
504 ADD 902
505 STO 902
506 LDD 903
507 INC ACC
508 STO 903
509 CMP 901
510 JPN 502
511 END
…
900
901
902 0
903 0
© UCLES 2020 9608/13/O/N/20
MUHAMMAD ALI KHAN
PAGE 703
Trace the program currently in memory using the following trace table when the values
2, 10 and 3 are input.
Memory address
Instruction
ACC
address
900 901 902 903
0 0
500 2
[6]
© UCLES 2020 9608/13/O/N/20 [Turn over
MUHAMMAD ALI KHAN
PAGE 704
10
X 1 1 0 0 1 0 1 0
..................................................................................................................................... [1]
..................................................................................................................................... [1]
(iii) State why the binary number in X cannot represent a Binary Coded Decimal (BCD).
...........................................................................................................................................
..................................................................................................................................... [1]
11
6 Lara is managing a team of software developers who are writing a computer program.
(a) Benedict is one of the developers. He is struggling to keep up with his workload.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Lara has identified that when a specific sequence of actions is performed in the program, a
run-time error causes the program to crash.
She has decided there is not enough time to debug the code because the client needs the
system urgently, and there is a possibility that the client may never perform this sequence of
actions.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) The client wants to copyright the final program so that no one else can copy or amend it.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Identify two software licences that would be appropriate for the program.
Licence 1 ...........................................................................................................................
Licence 2 ...........................................................................................................................
[2]
(iii) Identify one software licence that would not be appropriate for the program. Justify your
choice.
Justification .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
© UCLES 2020 9608/13/O/N/20 [Turn over
MUHAMMAD ALI KHAN
PAGE 706
12
Wilbur Designs
(a) Describe how the logo is represented and encoded by the computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Wilbur scans a hand drawn image. The scanned image uses 8 bits to store the colour for
each pixel. The image is 2048 pixels wide by 1024 pixels high.
(i) Calculate an estimate of the file size of the scanned image. Give your answer rounded to
the nearest MB.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Answer ................................. MB
[2]
13
(ii) Wilbur wants to compress the scanned image before emailing it to his colleague.
Describe one lossy compression technique that Wilbur can use to compress this image.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
14
B X
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(b) Identify one logic gate not used in the logic circuit shown. Complete the truth table for this
logic gate with the inputs A and B.
A B Output
0 0
0 1
1 0
1 1
[2]
© UCLES 2020 9608/13/O/N/20
MUHAMMAD ALI KHAN
PAGE 709
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2020 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Benefit:
• Programs may be interpreted on different platforms
Drawback:
• Intermediate code / program still needs to be interpreted on the user’s
computer, which may run slowly
• Extra CPU resources may be required
• The router has the public IP address for the home network
• All data comes through the router
• The laptop is not accessible / visible to the outside world
• … to ensure security // to protect the laptop from external threats
• Satellite
• Send data to satellites in orbit
• Javascript
5(b) 1 mark for the first three rows correct 1 mark for the last row correct 2
Bidirectional 9 9
Arithmetic:
• ADD // INC
Data movement
• STO // LDD // LDI // LDM
5(d)(i) 202 1
5(d)(ii) –54 1
5(d)(iii) Both nibbles are binary numbers representing denary numbers greater than 9 1
e.g.
• Reduce his workload // Review his work demands
• Redistribute his work
• Arrange a meeting with him
• ... to discuss the reasons why he is struggling
e.g.
• Not acting in best interest of the client
• ... The error could cause significant problems for the client if encountered
• The product does not meet the highest possible standard
• Not acting in the best interest of the development company
• … if the error occurs, it could lead to repercussions for the development
company
• Commercial
• Shareware
Working:
1024 × 2048 = 2ௗ097ௗ152 pixels
= 2ௗ097ௗ152 bytes (8 bits per pixel)
= 2ௗ097ௗ152 / 1024 = 2048 KB
= 2048 / 1024 MB
Answer: 2 MB
7(b)(ii) 1 mark for identification of method, max 2 for description for one method 3
e.g.
• Reduce the colour depth
• … reduce the number of bits per colour
• … each pixel has fewer bits
A B C Working space X
0 0 0 1
0 0 1 0
0 1 0 1
0 1 1 1
1 0 0 0
1 0 1 0
1 1 0 1
1 1 1 0
8(b) 1 mark for correct name, 1 mark for corresponding truth table 2
• NAND
A B Output
0 0 1
0 1 1
1 0 1
1 1 0
• XOR
A B Output
0 0 0
0 1 1
1 0 1
1 1 0
INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.
INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.
DC (PQ) 214537
© UCLES 2021 [Turn over
MUHAMMAD ALI KHAN
PAGE 720
(i) Complete the following table to describe the two terms about graphics.
Term Description
...........................................................................................................................
Pixel ...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
File header ...........................................................................................................................
...........................................................................................................................
[2]
(ii) The image is scanned with an image resolution of 1024 ) 512 pixels, and a colour depth
of 8 bits per pixel.
Calculate an estimate for the file size, giving your answer in mebibytes. Show your
working.
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Identify one method of lossless compression that can be used to compress the image and
describe how the method will reduce the file size.
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2021 9618/11/M/J/21
MUHAMMAD ALI KHAN
PAGE 721
(c) One of the colours used in the image has the hexadecimal colour code:
#FC238A
FC is the amount of red, 23 is the amount of green and 8A is the amount of blue in the colour.
..................................................................................................................................... [1]
(ii) The amount of green in binary is 00100011. This has the denary number 15 added to it
to create a second colour.
Add the denary number 15 to the binary number 00100011 and give your answer in
binary.
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Subtract the denary number 10 from the two’s complement representation 00100011.
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(d) Anya made sure that the image was not subject to any copyright before scanning it.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(a) Draw one line from each utility software to its correct description.
[4]
(b) Identify four key management tasks that the Operating System will perform.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
4 ................................................................................................................................................
[4]
3 A processor has one general purpose register, the Accumulator (ACC), and several special
purpose registers.
(a) Complete the following description of the role of the registers in the fetch-execute cycle by
writing the missing registers.
(b) The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
LDD <address> Direct addressing. Load the contents of the location at the given address to ACC
Indirect addressing: The address to be used is at the given address. Load the
LDI <address>
contents of this second address to ACC
Indexed addressing. Form the address from <address> + the contents of the
LDX <address>
Index Register. Copy the contents of this calculated address to ACC
LDR #n Immediate addressing. Load the number n to IX
MOV <register> Move the contents of the accumulator to the given register (IX)
STO <address> Store contents of ACC at the given address
ADD <address> Add the contents of the given address to the ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP <address> Compare the contents of ACC with the contents of <address>
JPE <address> Following a compare instruction, jump to <address> if the compare was True
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
OUT Output to the screen the character whose ASCII value is stored in ACC
END Return control to the operating system
Bits in ACC are shifted logically n places to the left. Zeros are introduced on
LSL #n
the right hand end
Bits in ACC are shifted logically n places to the right. Zeros are introduced on
LSR #n
the left hand end
<address> can be an absolute address or a symbolic address
# denotes a denary number, e.g. #123
The current contents of the main memory and selected values from the ASCII character set
are shown.
365 1
366 3
367 65
368 66
IX 0
Complete the trace table for the program currently in main memory.
1 3 65 66 0
[6]
10
0 0 1 1 0 1 0 1
Write the contents of the Accumulator after the processor has executed the following
instruction:
LSL #2
[1]
0 0 1 1 0 1 0 1
Identify the mathematical operation that the following instruction will perform on the
contents of the accumulator.
LSR #3
...........................................................................................................................................
..................................................................................................................................... [1]
11
4 Melinda and her friends set up a peer-to-peer network between their computers to share data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Describe two drawbacks to Melinda and her friends of using a peer-to-peer network.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(c) Melinda connects her laptop to the internet through her router.
(i) Tick () one box in each row to identify whether the task is performed by the router or
not.
12
(ii) Melinda mainly uses the internet to watch films and play computer games.
Tick () one box to identify whether Melinda should connect to the router using a wired
or wireless network and justify your choice.
Wired
Wireless
Justification .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(d) Melinda sends emails from her webmail account (email account accessed through a website).
Explain whether Melinda is using the internet, or the World Wide Web (WWW), or both.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
13
Describe what is meant by an embedded system, using the washing machine as an example.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) The washing machine’s embedded system makes use of both Random Access Memory
(RAM) and Read Only Memory (ROM).
State the purpose of RAM and ROM within the washing machine’s embedded system.
RAM ..........................................................................................................................................
...................................................................................................................................................
ROM .........................................................................................................................................
...................................................................................................................................................
[2]
(c) The temperature in her refrigerator must be kept between 4 and 6 degrees Celsius.
The microprocessor in the refrigerator turns on the cooling if the temperature is too high, and
turns off the cooling if the temperature is too low.
Explain why the system in the refrigerator is a control and not a monitoring system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
14
State the type of validation check that each of the algorithms performs.
(a)
INPUT x
OUTPUT "Invalid"
ENDIF
.................................................................................................................................................... [1]
(b)
INPUT x
IF x = "" THEN
OUTPUT "Invalid"
ENDIF
.................................................................................................................................................... [1]
(c)
INPUT x
OUTPUT "Invalid"
ENDIF
.................................................................................................................................................... [1]
15
(a) Bobby tells Kim that a file-based approach is usually better than a relational database.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Bobby has a shop that sells products to customers. His database will store data about his
customers, their payment details, orders and the products he sells. Customers will have login
details to access their accounts. The database will update customers’ payment and login
details without keeping any historical records.
(i) Give one example of each of the following relationships from Bobby’s database.
one-to-one
...........................................................................................................................................
...........................................................................................................................................
one-to-many
...........................................................................................................................................
...........................................................................................................................................
many-to-many
...........................................................................................................................................
...........................................................................................................................................
[3]
(ii) Tick () one box to identify the relationship that cannot be directly implemented in a
normalised relational database.
one-to-one
one-to-many
many-to-many
[1]
© UCLES 2021 9618/11/M/J/21 [Turn over
MUHAMMAD ALI KHAN
PAGE 734
16
Write a Data Definition Language (DDL) statement to define a new database with the
name SHOPORDERS.
...........................................................................................................................................
..................................................................................................................................... [1]
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
8 Tick () one box in each row to identify the logic gate that each statement describes.
[3]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Pixel:
• A single square of one colour
• The smallest addressable element in an image
File header:
• Data about the bitmap image (e.g. number of colours)
1(a)(ii) 1 mark per bullet point for working, 1 mark for answer 3
Working:
• 1024 × 512 = 524ௗ288 pixels/bytes
• 524288 / 1024 / 1024
Answer:
0.50 mebibytes
• Run-length encoding
• Replace sequences of the same colour pixel
• … with colour code and number of identical pixels
1(c)(i) 252 1
0010 0011
+ 1111 0110
0001 1001
11 11
• memory management
• file management
• security management
• hardware / device / peripheral / resources management
• input/output management
• process management
• error checking and recovery
• provision of a platform for software
• provision of a user interface
The Program Counter holds the address of the next instruction to be loaded.
This address is sent to the Memory Address Register.
The Memory Data Register holds the data fetched from this address. This
data is sent to the Current Instruction Register and the Control Unit
decodes the instruction’s opcode.
The Program Counter is incremented.
3(c)(i) 1
1 1 0 1 0 1 0 0
• In order to share files etc. all the computers involved need to be switched
on
• ... so the files etc. may not be always available
Wired
• Faster connection // higher bandwidth
• …. needed as she is downloading/streaming large files
• … less time waiting / less latency / fewer delays
• More reliable / stable connection
• … is less susceptible to issues with distance/walls/interference
• More secure
Wireless
• Freedom of movement
• … can move between different rooms with a mobile device and still
receive/transmit data
• … no need of a physical connection
• Easily expanded if friends want to access the same network
• Less cabling / expertise is needed
• ... making the initial setup less expensive
RAM:
• Store the choices/wash program the user has entered // stores the data
read from the sensors // stores the time left in the program // by example
ROM:
• Store the start-up instructions (for the washing cycles)
one-to-one
• e.g. customer to payment details // customer to login details
one-to-many
• e.g. customer to order
many-to-many
• e.g. order to product // customer to product
7(b)(ii) 1 mark 1
one-to-one
one-to-many
many-to-many 9
7(b)(iii) 1 mark 1
• table name
• field name // attribute
• data type
• type of validation
• Primary Key
• Foreign Key
• relationships
INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.
INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.
DC (LK) 205797/1
© UCLES 2021 [Turn over
MUHAMMAD ALI KHAN
PAGE 746
1 Raj owns houses that other people rent from him. He has a database that stores details about
the people who rent houses, and the houses they rent. The database, HOUSE_RENTALS, has the
following structure:
(a) Give the definition of the following database terms, using an example from the database
HOUSE_RENTALS for each definition.
..............................................................................................................................
Field
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
Entity
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
Foreign key
..............................................................................................................................
..............................................................................................................................
[6]
(b) Tick () one box to identify whether the database HOUSE_RENTALS is in Third Normal Form
(3NF) or not in 3NF.
Justify your choice using one or more examples from the database HOUSE_RENTALS.
In 3NF
Not in 3NF
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(i) Complete the following Data Definition Language (DDL) statement to define the table
RENTAL.
.......................................................... (RentalID)
);
[4]
(ii) Write a Data Manipulation Language (DML) script to return the first name and last name
of all customers who have not paid their deposit.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(a) Explain the reasons why it is important that Aisha acts ethically in relation to her team
members.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) The team are developing a computer game where the user plays a board game (such as
chess) against the computer.
Describe how the computer would use Artificial Intelligence (AI) to play the board game.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Tick () one or more boxes in each row to identify the licence(s) each statement describes.
Free Open
Commercial
Statement Software Source Shareware
Software
Foundation Initiative
[4]
B S
[4]
A B C Working space S
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[2]
4 The table shows part of the instruction set for a processor. The processor has one general purpose
register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
Direct addressing. Load the contents of the location at the given address to
LDD <address>
ACC
STO <address> Store contents of ACC at the given address
ADD <address> Add the contents of the given address to the ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
DEC <register> Subtract 1 from the contents of the register (ACC or IX)
CMP <address> Compare the contents of ACC with the contents of <address>
JPE <address> Following a compare instruction, jump to <address> if the compare was True
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
IN Key in a character and store its ASCII value in ACC
OUT Output to the screen the character whose ASCII value is stored in ACC
END Return control to the operating system
# denotes a denary number, e.g. #123
The current contents of the main memory and selected values from the ASCII character set are:
100 68
101 65
102 100
(a) Complete the trace table for the program currently in main memory when the following
characters are input:
A D
Do not trace the program any further when the third input is required.
[4]
Instruction
Explanation
Opcode Operand
AND #n Bitwise AND operation of the contents of ACC with the operand
AND <address> Bitwise AND operation of the contents of ACC with the contents of <address>
XOR #n Bitwise XOR operation of the contents of ACC with the operand
XOR <address> Bitwise XOR operation of the contents of ACC with the contents of <address>
OR #n Bitwise OR operation of the contents of ACC with the operand
OR <address> Bitwise OR operation of the contents of ACC with the contents of <address>
<address> can be an absolute address or a symbolic address
# denotes a denary number, e.g. #123
Bit Number 7 6 5 4 3 2 1 0
300 0 1 1 0 0 1 1 0
(i) The contents of memory address 300 represent an unsigned binary integer.
Write the denary value of the unsigned binary integer in memory address 300.
..................................................................................................................................... [1]
(ii) An assembly language program needs to test if bit number 2 in memory address 300
is a 1.
......................... #4
[1]
(iii) An assembly language program needs to set bit numbers 4, 5, 6 and 7 to 0, but keep
bits 0 to 3 with their existing values.
...........................................................................................................................................
..................................................................................................................................... [2]
(a) Complete the following descriptions of internal components of a computer by writing the
missing terms.
or read from.
logical comparisons.
[5]
(b) Describe the ways in which the following factors can affect the performance of his laptop
computer.
Number of cores
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Clock speed
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
10
(c) Seth accesses both software and data using cloud computing.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
11
(d) Draw one line from each term to its most appropriate description.
Term Description
Public IP address
It increments by 1 each time the device
connects to the internet
[4]
12
(a) State the number of characters that can be represented by the ASCII character set and the
extended ASCII character set.
ASCII ...........................................................
(b) Explain how a word such as ‘HOUSE’ is represented by the ASCII character set.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
The Unicode value for the character ‘1’ is denary value 49.
(i) Write the hexadecimal value for the Unicode character ‘1’.
..................................................................................................................................... [1]
(ii) Write the denary value for the Unicode character ‘5’.
..................................................................................................................................... [1]
13
(a) Jennifer uses a program library to help her write her computer program.
Describe how a program library can be used while writing a computer program.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Jennifer uses an Integrated Development Environment (IDE) to write her computer program.
(i) The IDE allows Jennifer to use both an interpreter and a compiler while creating her
computer program.
Describe the ways in which Jennifer can use both a compiler and an interpreter while
developing the program.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) Identify two debugging tools that a typical IDE can provide.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
14
8 A company has several security measures in place to prevent unauthorised access to the data on
its computers.
(a) Describe the difference between the security and privacy of data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Each employee has a username and password to allow them to log onto a computer. An
employee’s access rights to the data on the computers is set to either read-only, or read and
write.
Identify one other software-based measure that could be used to restrict the access to the
data on the computers.
...................................................................................................................................................
............................................................................................................................................. [1]
(c) The company is also concerned about threats posed by networks and the internet.
Identify two threats to the data that are posed by networks and the internet.
Threat 1 ....................................................................................................................................
...................................................................................................................................................
Threat 2 ....................................................................................................................................
...................................................................................................................................................
[2]
15
BLANK PAGE
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2021 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
A column/attribute in a table
Field
e.g. CustomerID in the table CUSTOMER
Example script:
SELECT FirstName, LastName
FROM CUSTOMER, RENTAL
WHERE DepositPaid = No
AND RENTAL.CustomerID = CUSTOMER.CustomerID;
• The rules / past moves / decision making algorithms of the game will be
stored
• The AI program is trained, by playing many times
• AI will look (ahead) at possible moves
• ... and/or analyse the pattern of past choices
• … and choose the move most likely to be successful
• Computer could learn how to improve // learn from previous mistakes
• … by storing the positive/negative result of choices
• ... and changing its future choices
Free Open
Commercial
Statement Software Source Shareware
Software
Foundation Initiative
A B C Working space S
0 0 0 0
0 0 1 1
0 1 0 1
0 1 1 0
1 0 0 0
1 0 1 1
1 1 0 1
1 1 1 1
Memory address
Instruction
ACC
address
100 101 102
68 65 100
70 65
71
72
73
74
76 100
77 101
78 101
79
70 68
71
72
80 101
81 100
82 100
83
(70)
4(b)(i) 102 1
4(b)(ii) AND 1
AND #15
The control unit/bus transmits the signals to coordinate events based on the
pulses of the (system) clock.
The data bus carries data to components, while the address bus carries the
address where data is being written to or read from.
5(b) 1 mark per bullet point to max 3 per factor. max 4 overall. 4
Number of cores:
• Each core processes one instruction per clock pulse
• More/multiple cores mean that sequences of instructions can be split
between them
• … and so more than one instruction is executed per clock pulse // more
sequences of instructions can be run at the same time
• More cores decreases the time taken to complete task
Clock speed:
• Each instruction is executed on a clock pulse // one F-E cycle is run on
each clock pulse
• ... so the clock speed dictates the number of instructions that can be run
per second
• The faster the clock speed the more instructions can be run per second
ASCII = 128 // 27
6(c)(i) 31 1
6(c)(ii) 53 1
7(b)(i) 1 mark per bullet point to max 4; max 3 from each section 4
Interpreter:
• Use an interpreter while writing the program
• … to test/debug the partially completed program
• … because errors can be corrected and processing continue from where
the execution stopped // errors can be corrected in real time // errors are
identified one at a time
Compiler:
• Use the compiler after the program is complete
• … to create an executable file
• Use the compiler to repeatedly test the same (completed) section
• … without having to re-interpret every time // compiler not needed at run-
time
e.g.
• Breakpoints
• Single stepping
• Report windows
INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.
INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.
DC (CE/FC) 221502
© UCLES 2021 [Turn over
MUHAMMAD ALI KHAN
PAGE 772
1 (a) Draw one line from each binary value to its equivalent (same) value on the right.
Binary value
1 kibibyte
8 bits
1 gigabyte
8000 bits
1 byte
1000 kilobytes
1 kilobyte
1024 mebibytes
1 gibibyte
8192 bits
1 megabyte
1 mebibyte
[5]
(b) (i) Perform the following binary addition. Show your working.
10101010
+ 00110111
[2]
(ii) State how an overflow can occur when adding two binary integers.
...........................................................................................................................................
..................................................................................................................................... [1]
...................................................................................................................................................
............................................................................................................................................. [1]
2 Xanthe wants to maintain the integrity and security of data stored on her computer.
(a) Explain the difference between data security and data integrity.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Xanthe uses both data validation and data verification when entering data on her computer.
(i) Describe how data validation helps to protect the integrity of the data. Give an example
in your answer.
Description ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Example ............................................................................................................................
[2]
(ii) Describe how data verification helps to protect the integrity of the data. Give an example
in your answer.
Description ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Example ............................................................................................................................
[2]
Give two similarities and one difference between spyware and a virus.
Similarity 1 ................................................................................................................................
...................................................................................................................................................
Similarity 2 ................................................................................................................................
...................................................................................................................................................
Difference .................................................................................................................................
...................................................................................................................................................
[3]
A
B X
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Complete the truth table for the given logic circuit.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[2]
(c) Identify one logic gate not used in the given logic circuit. Draw the symbol for the logic gate
and complete its truth table.
Symbol:
Truth table:
A B Output
0 0
0 1
1 0
1 1
[3]
4 Francis is starting his first job as a software developer for a multinational company.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Francis is shown the software he will be working on. He is unfamiliar with the Integrated
Development Environment (IDE) he is required to use.
(i) Describe the ways in which Francis can act ethically in this situation.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) A typical IDE provides debugging tools to support the testing of a program.
Identify three other tools or features found in a typical IDE to support the writing of the
program.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(c) Francis is part of a team writing a program. He finds an error in part of the program that
has already been tested. He decides not to tell anyone because he is worried about the
consequences.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
© UCLES 2021 9618/11/O/N/21
MUHAMMAD ALI KHAN
PAGE 777
complete. They translate all the code at the same time and then run the program.
They produce ............................................... files that can be run without the source code.
and then run that line of code. They are most useful while developing the programs because
errors can be corrected and then the program continues from that line.
5 Javier owns many shops that sell cars. He employs several managers who are each in charge of
one or more shops. He uses the relational database CARS to store the data about his business.
(a) Tick (9) one box in each row to identify whether each field is a primary key or a foreign key.
MANAGER ManagerID
SHOP ManagerID
CAR RegistrationNumber
CAR ShopID
[2]
(b) Describe the ways in which access rights can be used to protect the data in Javier’s database
from unauthorised access.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) Javier uses Data Definition Language (DDL) and Data Manipulation Language (DML)
statements in his database.
(i) Complete the following DML statements to return the number of cars for sale in each
shop.
SELECT COUNT(.........................................................)
FROM .........................................................
......................................................... ShopID
[3]
(ii) Complete the DML statement to include the following car in the table CAR.
Field Data
RegistrationNumber 123AA
Make Tiger
Model Lioness
NumberOfMiles 10500
ShopID 12BSTREET
............................ ("123AA","Tiger","Lioness",10500,"12BSTREET")
[2]
10
BLANK PAGE
11
6 (a) There are two errors in the following register transfer notation for the fetch-execute cycle.
1 MAR [PC]
2 PC >3&@í
3 MDR [MAR]
4 CIR [MDR]
Line
Description of the error Correct statement
number
[4]
12
(b) The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
LDD <address> Direct addressing. Load the contents of the location at the given address to
ACC
STO <address> Store the contents of ACC at the given address
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP <address> Compare the contents of ACC with the contents of <address>
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
IN Key in a character and store its ASCII value in ACC
OUT Output to the screen the character whose ASCII value is stored in ACC
END Return control to the operating system
XOR #n Bitwise XOR operation of the contents of ACC with the operand
XOR <address> Bitwise XOR operation of the contents of ACC with the contents of <address>
AND #n Bitwise AND operation of the contents of ACC with the operand
AND <address> Bitwise AND operation of the contents of ACC with the contents of <address>
OR #n Bitwise OR operation of the contents of ACC with the operand
OR <address> Bitwise OR operation of the contents of ACC with the contents of <address>
LSL #n Bits in ACC are shifted logically n places to the left. Zeros are introduced on
the right hand end
LSR #n Bits in ACC are shifted logically n places to the right. Zeros are introduced on
the left hand end
<address> can be an absolute or symbolic address
# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001101
Address Data
100 00001111
101 11110000
102 01010101
103 11111111
104 00000000
13
Each row of the following table shows the current contents of ACC in binary and the instruction
that will be performed on those contents.
Complete the table by writing the new contents of the ACC after the execution of each
instruction.
11111111 OR 101
10101010 LSR #2
[4]
14
(a) He repeats the recording of the sound several times, with a different sample rate each time.
(i) Describe the reasons why the sound is closer to the original when a higher sample rate
is used.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Describe the reasons why the sound file size increases when a higher sample rate is
used.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(b) Bobby wants to email the sound file to his school email address. He compresses the file
before sending the email.
(i) Explain the reasons why Bobby compresses the sound file.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
15
(a) State whether the network will be a LAN (local area network) or a WAN (wide area network).
Justify your choice.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) One classroom in the building has 30 computers. The computers need to be connected to the
network. Each computer has a network interface card (NIC).
Identify two possible devices that can be used to physically connect the 30 computers to the
rest of the network.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(c) The school has several laptops. Each laptop has a Wireless Network Interface Card (WNIC).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
16
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2021 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
1 kibibyte
8 bits
1 gigabyte
8000 bits
1 byte
1000
kilobytes
1 kilobyte
1024
mebibytes
1 gibibyte
8192 bits
1 megabyte
1 mebibyte
e.g.
1010 1010
0011 0111
1110 0001
111 111
1(b)(ii) The result is a larger number than can be stored in the given number of bits. 1
// The result is greater than 255
1(c) 240 1
• Virus can damage computer data; spyware only records / accesses data
• Virus does not send data out of the computer; spyware sends recorded
data to third party
• Virus replicates itself; spyware does not replicate itself
• A AND B …
• … XOR C …
• … OR NOT B
A B C Working space X
0 0 0 1
0 0 1 1
0 1 0 0
0 1 1 1
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 0
3(c) 1 mark for gate, 1 mark for matching symbol, 1 mark for matching truth table 3
NOR
A B OUTPUT
0 0 1
0 1 0
1 0 0
1 1 0
NAND
A B OUTPUT
0 0 1
0 1 1
1 0 1
1 1 0
Primary Foreign
Table Field name
Key (PK) Key (FK)
MANAGER ManagerID 9
SHOP ManagerID 9
CAR RegistrationNumber 9
CAR ShopID 9
SELECT COUNT(RegistrationNumber)
FROM CAR
GROUP BY ShopID
Line
Description of the error Correct statement
number
• LAN
• Small geographical area
• No leasing external infrastructure / transmission media // does not use
internet to transmit within the building
• router
• switch
• hub
INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.
INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.
DC (RW/SG) 206391/2
© UCLES 2021 [Turn over
MUHAMMAD ALI KHAN
PAGE 797
1 When designing computer systems, it is important to consider the security, integrity and privacy of
the data.
Draw one line from each measure to indicate whether it keeps data secure or protects the integrity
of data.
Measure
Firewall
Double entry
Data Security
Presence check
Data Integrity
Access rights
Password
[2]
2 (a) Complete the truth table for each of the following two logic gates.
A B Output
A 0 0
B 0 1
1 0
1 1
A B Output
A 0 0
B 0 1
1 0
1 1
[2]
X
B
[2]
(a) Andy uses several input devices to play the games. These include a keyboard and a
microphone.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Andy plays some of the computer games over the internet. He has several devices that
connect wirelessly to the router in his house.
(i) Identify the topology of Andy’s home network. Justify your choice.
Topology ............................................................................................................................
Justification .......................................................................................................................
...........................................................................................................................................
[2]
(ii) The router has a wireless access point (WAP) to allow the devices to connect wirelessly.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
BLANK PAGE
1 1 0 0 1 1 0 1
(a) The binary value in the register represents an unsigned binary integer.
............................................................................................................................................. [1]
(b) The binary value in the register represents a two’s complement binary integer.
............................................................................................................................................. [1]
............................................................................................................................................. [1]
(d) State why the value in the register cannot be interpreted as a Binary Coded Decimal (BCD).
...................................................................................................................................................
............................................................................................................................................. [1]
Register 1 0 0 1 1 1 1 0 1
Register 2 0 0 1 0 1 1 0 1
(i) Add the contents of Register 1 and Register 2. Show your working.
Answer ..............................................................................................................................
[2]
(ii) Subtract the contents of Register 2 from the contents of Register 1. Show your working.
Answer ..............................................................................................................................
[2]
(a) Complete the table by writing a description of each vector graphic term and give an example
for this logo.
Property
Drawing list
[4]
(b) Riya takes a photograph using a digital camera. The photograph is stored as a bitmap image.
(i) Describe two differences between a vector graphic and a bitmap image.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
© UCLES 2021 9618/12/O/N/21
MUHAMMAD ALI KHAN
PAGE 804
(ii) Riya needs to email the photograph. She compresses the photograph before sending it
using an email.
Describe two lossy methods that Riya can use to compress the image.
Method 1 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Method 2 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
10
6 A shop sells plants to customers. The shop manager has a relational database to keep track of the
sales.
PURCHASE(PurchaseID, CustomerID)
• The first stage is from a database that is not normalised (0NF) to First Normal Form
(1NF).
• The second stage is from 1NF to Second Normal Form (2NF).
• The third stage is from 2NF to Third Normal Form (3NF).
Tick (9) one box in each row to identify the appropriate stage for each task.
Normalisation stage
Task
0NF to 1NF 1NF to 2NF 2NF to 3NF
[2]
PLANT CUSTOMER
PURCHASE_ITEM PURCHASE
[3]
© UCLES 2021 9618/12/O/N/21
MUHAMMAD ALI KHAN
PAGE 806
11
Describe the purpose and contents of the data dictionary in the DBMS.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) The shop manager uses both Data Definition Language (DDL) and Data Manipulation
Language (DML) statements to create and search the database.
(i) Complete the DML statements to return the total number of items purchased with the
purchase ID of 3011A.
SELECT SUM(..................................................)
FROM ..................................................
(ii) Write DDL statements to include a field in the table PURCHASE to store the date of the
order.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
12
Tick (9) one box in each row to identify whether each event is an example of a hardware
interrupt or a software interrupt.
(b) Describe the file management tasks that an Operating System performs.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(c) Identify two utility programs that can be used to improve the performance of a computer and
state how they improve the performance.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2021 9618/12/O/N/21
MUHAMMAD ALI KHAN
PAGE 808
13
(a) Describe the role of the following special purpose registers in the fetch-execute (F-E) cycle.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
Identify one other special purpose register used in the Von Neumann model for a
computer system.
...........................................................................................................................................
..................................................................................................................................... [1]
14
(b) The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
LDD <address> Direct addressing. Load the contents of the location at the given address to
ACC
STO <address> Store the contents of ACC at the given address
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP <address> Compare the contents of ACC with the contents of <address>
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
IN Key in a character and store its ASCII value in ACC
OUT Output to the screen the character whose ASCII value is stored in ACC
END Return control to the operating system
XOR #n Bitwise XOR operation of the contents of ACC with the operand
XOR <address> Bitwise XOR operation of the contents of ACC with the contents of <address>
OR #n Bitwise OR operation of the contents of ACC with the operand
OR <address> Bitwise OR operation of the contents of ACC with the contents of <address>
AND #n Bitwise AND operation of the contents of ACC with the operand
AND <address> Bitwise AND operation of the contents of ACC with the contents of <address>
LSL #n Bits in ACC are shifted logically n places to the left. Zeros are introduced on
the right hand end
LSR #n Bits in ACC are shifted logically n places to the right. Zeros are introduced on
the left hand end
<address> can be an absolute or symbolic address
# denotes a denary number, e.g. #123
Address Data
100 01010101
101 11110000
102 00001111
103 00000000
104 11111111
15
(i) In the following table, each row shows the current contents of the ACC in binary and the
instruction that will be performed on those contents.
Complete the table by writing the new contents of the ACC after the execution of each
instruction.
00001111 LSL #4
11111111 OR 102
[4]
(ii) The following table contains five assembly language instruction groups.
Write an appropriate assembly language instruction for each instruction group, using the
given instruction set. The first one has been completed for you.
Arithmetic operations
Compare instructions
[4]
16
(iii) The opcode LDM uses immediate addressing. The opcode LDD uses direct addressing.
Description ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2021 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Firewall
Presence check
Password
NOR
A B Output
0 0 1
0 1 0
1 0 0
1 1 0
NAND
A B Output
0 0 1
0 1 1
1 0 1
1 1 0
OR
4(a) 205 1
4(b) – 51 1
4(c) CD 1
0011 1101
+0010 1101
0110 1010
111 1 1
0011 1101
+1101 0011 (two’s complement)
0001 0000
1111 111
5(a) 1 mark for each description,1 mark for each valid example 4
5(b)(i) 1 mark for each bullet point to max 2 for each difference 4
• Bitmap files are usually bigger than vector graphics files because of the
need to store data about each pixel
• Vector graphics have smaller file size because they contain just the
instructions to create the shapes
5(b)(ii) 1 mark for each bullet point to max 2 for each method 4
Normalisation stage
Task
0NF to 1NF to 2NF to
1NF 2NF 3NF
PLANT CUSTOMER
PURCHASE_ITEM PURCHASE
SELECT SUM(Quantity)
FROM PURCHASE_ITEM
WHERE PurchaseID = "3011A";
Buffer full 9
1
Printer is out of paper 9
Power failure 9
1
Stack overflow 9
7(c) 1 mark for identifying program 1 mark for description, max 2 per program 4
e.g.
• Defragmentation
• Less time is taken to access files because each one is contiguous so
there is less head movement
• Virus checker
• makes more RAM available for programs to run
• ... because it removes software that might be taking up memory /
replicating
• Disk/system clean up
• releases storage by removing unwanted / temporary files
8(a)(i) 1 mark for each bullet point to max 2 for each register 4
MAR
• Stores the next address to be fetched
• ... held in the Program Counter (PC)
• The data at this address is then fetched
MDR
• Stores the data from the address pointed to by the MAR
• The data in it is copied to the Current Instruction Register (CIR)
• Indirect addressing
• the address to be used is at the given address
• Relative addressing
• the address to be used is an offset number of locations away, relative to
the address of the current instruction
• Indexed addressing
• form the address from the given address plus the contents of the index
register
INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.
INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.
DC (LK/CGW) 301923/2
© UCLES 2022 [Turn over
MUHAMMAD ALI KHAN
PAGE 823
...................................................................................................................................................
............................................................................................................................................. [1]
(b) Convert the signed denary value –100 into an 8-bit two’s complement binary integer.
Working .....................................................................................................................................
...................................................................................................................................................
(c) Convert the denary number 251 into hexadecimal. Show your working.
Working .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Answer ............................................................................
[2]
01010000
+00111110
[1]
Random Access Memory (RAM) and Read Only Memory (ROM) are both examples of
......................................................................... memory.
(ii) Explain the difference between Programmable ROM (PROM), Erasable Programmable
ROM (EPROM) and Electrically Erasable Programmable ROM (EEPROM).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
(i) Complete the table by writing one set of values (input 1 and input 2) for each gate that
will give the output 1.
AND 1
NAND 1
XOR 1
NOR 1
[4]
(ii) Write the logic expression for the given logic circuit.
A
B
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
3 A teacher is writing examination papers on a laptop computer. The computer is connected to the
internet. The teacher is concerned about the security and privacy of the papers.
(a) State the difference between the security of data and the privacy of data.
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [1]
(b) Identify and describe two threats to the data. Identify one security measure to protect against
each threat. Each security measure must be different.
Threat 1 ....................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
Threat 2 ....................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
4 A teacher uses a relational database, MARKS, to store data about students and their test marks.
(a) Describe the advantages of using a relational database compared to a file-based approach.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Give the highest level of Normal Form (NF) the database MARKS is in and justify your choice.
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
12 A1 50
12 P10 100
13 A1 75
14 P10 60
Write a Structured Query Language (SQL) script to create the table STUDENT_TEST.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
(ii) Write a Structured Query Language (SQL) script to find the average mark of students in
test A7.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(d) The mark a student is awarded in a test will be entered into the database. This mark needs to
be a whole number between 0 and the maximum number of marks for that test (inclusive).
Explain how data validation and data verification can be used when a mark is entered.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
10
(a) Draw one line from each IDE feature to its correct description.
(b) The programmer wants to allow users to edit, improve and redistribute the program.
Identify two different types of software licence that the programmer could use.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
11
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
12
6 (a) A computer system is designed using the basic Von Neumann model.
(i) Describe the role of the registers in the Fetch-Execute (F-E) cycle.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
(ii) Describe when interrupts are detected in the F-E cycle and how the interrupts are
handled.
Detected ............................................................................................................................
...........................................................................................................................................
Handled .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[5]
13
(b) Identify one factor that can affect the performance of the computer system and state how it
impacts the performance.
Factor .......................................................................................................................................
Impact .......................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
14
(c) The table shows part of the instruction set for a processor. The processor has one general
purpose register, the Accumulator (ACC).
Instruction
Explanation
Opcode Operand
AND #n Bitwise AND operation of the contents of ACC with the operand
XOR #n Bitwise XOR operation of the contents of ACC with the operand
OR #n Bitwise OR operation of the contents of ACC with the operand
LSL #n Bits in ACC are shifted logically n places to the left. Zeros are
introduced on the right hand end
LSR #n Bits in ACC are shifted logically n places to the right. Zeros are
introduced on the left hand end
# denotes a denary number, e.g. #123
(i) Complete the register to show the result after the instruction AND #2 is executed.
Register before: 0 1 1 0 1 1 0 1
Register after:
[1]
(ii) Complete the register to show the result after the instruction OR #8 is executed.
Register before: 0 1 1 0 1 1 0 1
Register after:
[1]
15
(iii) Complete the register to show the result after the operation LSL #4 is executed.
Register before: 0 1 1 0 1 1 0 1
Register after:
[1]
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the May/June 2022 series for most
Cambridge IGCSE, Cambridge International A and AS Level and Cambridge Pre-U components, and some
Cambridge O Level components.
These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.
x the specific content of the mark scheme or the generic level descriptors for the question
x the specific skills defined in the mark scheme or in the generic level descriptors for the question
x the standard of response required by a candidate as exemplified by the standardisation scripts.
Marks awarded are always whole marks (not half marks, or other fractions).
x marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
x marks are awarded when candidates clearly demonstrate what they know and can do
x marks are not deducted for errors
x marks are not deducted for omissions
x answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.
Rules must be applied consistently, e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.
Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).
Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.
Random Access Memory (RAM) and Read Only Memory (ROM) are both
examples of primary memory.
AND 1 1
0 0
NAND 0 1
1 0
0 1
XOR
1 0
NOR 0 0
x A NAND B
x B XOR C
x OR
(A NAND B) OR (B XOR C)
3(a) Security prevents against loss while privacy prevents unauthorised access 1
3(b) 1 mark for identifying threat, 1 mark for description, 1 mark for security 6
measure (times 2)
e.g.
x Malware
x Malicious software that replicates and can delete/damage the
examination papers
x Install and run anti-malware
x Hacker/unauthorised access
x Illegal access in order to delete/damage the examination papers
x Use a firewall // strong passwords
x Spyware
x Software installed on the computer without the teacher’s knowledge
which records keystrokes and sends the data gathered about the
examination papers to a third party
x Use a firewall / install and run anti-spyware / use a virtual (onscreen)
keyboard
e.g.
x Reduced data redundancy // less repeated data
x …because each item of data is only stored once
x Maintains data consistency // improves data integrity
x …changes in one table will automatically update in another
x ... linked data cannot be entered differently in two tables
x Program-data independence
x …changes to the data do not require programs to be re-written
x Complex queries are easier to run
x Can provide different views
x ….so users can only see specific aspects of the database
x AVG(Mark)
x SELECT and FROM STUDENT_TEST
x WHERE clause
e.g.
SELECT AVG(Mark)
FROM STUDENT_TEST
WHERE TestID = "A7";
e.g.
x range check to make sure it is between 0 and max marks
x presence check to make sure a mark is entered
x type check to make sure an integer value is entered
5(a) 1 mark for 1 correct line, 2 marks for 2 correct lines, 3 marks for 3 or 4 4
correct lines, 4 marks for all 5 correct lines
Underlines or highlights
Dynamic syntax
statements that do not meet
check
the rules of the language
x The Program Counter (PC) holds the address of the next instruction …
x …and the contents are incremented / changed to the next address each
cycle
x The Memory Address Register (MAR) holds the address to fetch the data
(from the PC)
x The Memory Data Register (MDR) holds the data at the address in MAR
x The instruction is transferred to Current Instruction Register (CIR) for
decoding and execution
x Number of cores…
x …means more instructions can be carried out simultaneously
x Bus width …
x …allows the transfer of more data each time // allows more memory
locations to be directly accessed
x Cache …
x … the higher capacity the more frequently used instructions it can store
for fast access
INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.
INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.
DC (KN) 301924/3
© UCLES 2022 [Turn over
MUHAMMAD ALI KHAN
PAGE 846
1 (a) Draw one line from each image representation term to its correct definition.
Term Definition
[3]
(b) The following section of a bitmap image is 10 pixels wide and 5 pixels high. In this example,
each colour is represented by a letter, e.g. B is blue.
B B B B B B B B B B
Y Y P Y Y Y P Y Y Y
R R M R P K T T R R
B O P Y Y Y P G P P
R O R P P P R R R R
(i) Identify the smallest number of bits that can be used to represent each colour in the
complete bitmap image.
..................................................................................................................................... [1]
(ii) Calculate an estimate for the file size of the section of the bitmap image shown, giving
your answer in bytes. Use your answer from part (b)(i).
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(c) Describe how changing the colour depth of an image affects its file size.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(d) The first row of pixels in the image from part (b) is shown:
B B B B B B B B B B
Explain how this row of pixels can be compressed using lossless compression.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(a) One feature is a lane detection system. This system monitors the lines on either side of the
lane. If the car gets too close to one line, the system automatically moves the car away from
the line.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
• record the number of miles travelled in the current journey, from when the engine is
turned on to when it is turned off
• record the total number of miles the car has travelled since it was built.
Identify the data that will be stored in the primary and secondary storage of the car for these
two features.
Primary .....................................................................................................................................
...................................................................................................................................................
Secondary ................................................................................................................................
...................................................................................................................................................
[2]
(c) The car has a resistive touchscreen for the user to select options.
Tick () one box in each row to show whether each statement about a resistive touchscreen
is true or false.
3 The table shows part of the instruction set for a processor. The processor has one general purpose
register, the Accumulator (ACC).
Instruction
Explanation
Opcode Operand
AND #n Bitwise AND operation of the contents of ACC with the operand
Bitwise AND operation of the contents of ACC with the contents
AND <address>
of <address>
XOR #n Bitwise XOR operation of the contents of ACC with the operand
Bitwise XOR operation of the contents of ACC with the contents
XOR <address>
of <address>
OR #n Bitwise OR operation of the contents of ACC with the operand
Bitwise OR operation of the contents of ACC with the contents of
OR <address>
<address>
<address> can be an absolute or a symbolic address
# denotes a denary number, e.g. #123
(a) The ACC currently contains the following positive binary integer:
0 1 1 0 0 1 0 1
Write the bit manipulation instruction that would change the binary integer in ACC to:
1 1 1 1 1 1 1 1
(b) The ACC currently contains the following positive binary integer:
0 1 1 0 0 1 0 1
Write the bit manipulation instruction that would change the binary integer in ACC to:
1 0 0 1 1 0 1 0
01111110
............................................................................................................................................. [1]
(d) A three-place logical shift to the left is performed on the following positive binary integer.
01111110
............................................................................................................................................. [1]
(e) Convert the denary numbers 127 and 12 to 8-bit binary and then perform the subtraction
íLQELQDU\
12 in binary ...............................................................................................................................
íLQELQDU\ .....................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
4 A school stores personal data about its staff and students on its computer system.
(a) Explain why the school needs to keep both its data and its computer system secure from
unauthorised access.
Data ..........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(b) Complete the table by identifying two security threats to the data on a computer.
Prevention
Threat Description
method
..................................................................................
.......................... .................................................................................. ..........................
..................................................................................
..................................................................................
.......................... .................................................................................. ..........................
..................................................................................
[6]
(c) Data is encrypted when it is transmitted within the school network, or externally such as over
the internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
ACTOR FILM_FACT
FILM_ACTOR
[2]
(b) A composite primary key consists of two or more attributes that together form the primary key.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) Complete the SQL script to return the IDs of all the actors in the film with the title Cinderella.
SELECT .......................................................................................
FROM FILM_ACTOR
ON FILM_FACT.FilmID = ..............................................................................
(d) Write an SQL script to count the number of films that were released in January 2022.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
10
(e) A Database Management System (DBMS) is used to create and manipulate the database.
Complete the descriptions of the features and tools found in a DBMS using the given terms.
Not all terms will be used.
structure
11
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) Explain how a programmer can make use of a typical Integrated Development Environment
(IDE) when writing and testing a program.
Writing .......................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Testing ......................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
12
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[2]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [3]
13
9 (a) The following incomplete table contains four network devices and their descriptions.
Complete the table by writing the missing devices and missing descriptions.
Device Description
.................................................................................................................
Wireless
Network
.................................................................................................................
Interface Card
(WNIC)
.................................................................................................................
.................................................................................................................
Wireless Access
.................................................................................................................
Point (WAP)
.................................................................................................................
[4]
(b) Describe three differences between fibre-optic cables and copper cables.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
14
Describe CSMA/CD.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Term Definition
1(b)(i) 8 1
x Increasing the colour depth means more bits per pixel and hence more
data stored // Decreasing the colour depth means fewer bits per pixel
and hence less data stored
x The lane detection system is built into / integrated into the car
3(a) 1 mark for correct opcode and 1 mark for corresponding operand 2
e.g.
x OR...
x ... #255
3(b) 1 mark for correct opcode and 1 mark for corresponding operand 2
XOR #255
e.g.
x XOR...
x ... #255
3(c) 7E 1
3(d) 11110000 1
4(a) 1 mark per point, max 1 for data and max 1 for computer system 2
Data
x Data needs protecting from someone amending / deleting or taking it
Computer System
x Computer system need protecting to stop people for example, installing
malware or damaging the system
4(b) 1 mark for each correct threat, matching description and prevention 6
e.g.
ACTOR FILM_FACT
FILM_ACTOR
e.g.
SELECT COUNT(FilmID)
FROM FILM_FACT
WHERE ReleaseDate >= #01/01/2022# AND ReleaseDate <=
#31/01/2022#;
// WHERE ReleaseDate BETWEEN #01/01/2022# AND
#31/01/2022#;
// WHERE ReleaseDate = “January 2022”;
x data dictionary
x field names // primary keys
x primary keys //field names
x logical schema
x query
x interface
6(c) 1 mark per point, max 2 for writing, max 2 for testing 4
Writing e.g.
x Enter code into an editor
x Pretty printing to identify key terms
x Context-sensitive prompts to help complete statements
x Expand and collapse code blocks
x Auto-complete to suggest what to type next
x Auto-formatting to indent code blocks
x Dynamic syntax checking
Testing e.g.
x Single stepping to run the code line by line
x Breakpoints to stop the code at set points to check values
x Report window to see how variables change
A B C Working space X
0 0 0 0
0 0 1 0
0 1 0 1
0 1 1 0
1 0 0 1
1 0 1 0
1 1 0 0
1 1 1 0
x Self-driving cars
x Detects its position on the road and within the traffic
x Follows a route // Collision avoidance // Self-parking etc.
x Spoken Interfaces
x Use natural language processing
x ... to take a sentence and work out its meaning
x Game playing
x Models characters in a computer game
x ... to allow computer characters to react according to the player's
movements
Device Description
Wireless
Hardware component that allows a device to connect to
Network
a wireless network // Provides a MAC address to the
Interface Card
device to identify it on the wireless network
(WNIC)
INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.
INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.
DC (CJ/CT) 302751/2
© UCLES 2022 [Turn over
MUHAMMAD ALI KHAN
PAGE 867
00100111
00100111
(iii) Convert the 8-bit two’s complement binary integer into denary.
11100111
1 0 1 1 0 0 1 1
_ 0 1 1 1 0 1 0 1
[2]
(c) Give one similarity and two differences between the ASCII and Unicode character sets.
Similarity ...................................................................................................................................
...................................................................................................................................................
Difference 1 ..............................................................................................................................
...................................................................................................................................................
Difference 2 ..............................................................................................................................
...................................................................................................................................................
[3]
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Explain the effect of increasing the sampling resolution on the sound file.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
2 Draw one line from each security feature to its most appropriate description.
converts data to an
alternative form
firewall
pharming
anti-virus software
encryption
[4]
B X
[2]
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[2]
4 A photographer creates a relational database to store data about photographs taken at birthday
parties.
The database, PHOTOGRAPHS, stores details of the customer, the party, the photographs taken
and the cameras used.
The photographer has several cameras that are used for taking the photographs at the parties.
Each camera has a specific lens type (for example, XY32Z) and lighting type (for example, F1672).
Data about each photograph is stored in the database including the party at which it was taken,
the time it was taken and the camera used.
(a) Complete the entity-relationship (E-R) diagram for the database PHOTOGRAPHS.
PARTY CUSTOMER
PHOTO_DATA CAMERA_DATA
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) The table shows some sample data for the table PHOTO_DATA.
(i) State what is meant by a tuple. Give an example of a tuple from PHOTO_DATA.
Tuple .................................................................................................................................
...........................................................................................................................................
Example ............................................................................................................................
...........................................................................................................................................
[2]
(ii) Complete the Structured Query Language (SQL) script to display the total number of
photographs that have been taken using a camera with a camera ID starting with CAN.
FROM .........................................................................................
(d) Write an SQL script to include two new fields in CAMERA_DATA to store the number of
photographs currently on the camera and the date the camera was last used.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
10
5 (a) State what is meant by the stored program concept in the Von Neumann model of a
computer system.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) A Central Processing Unit (CPU) contains several special purpose registers and other
components.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(ii) Tick (9) one box in each row to identify the system bus used by each CPU component.
System clock
[1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
11
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
12
6 The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
LDD <address> Direct addressing. Load the contents of the location at the given
address to ACC
LDX <address> Indexed addressing. Form the address from <address> + the
contents of the index register. Copy the contents of this calculated
address to ACC
LDR #n Immediate addressing. Load the number n to IX
STO <address> Store contents of ACC at the given address
ADD <address> Add the contents of the given address to the ACC
ADD #n Add the denary number n to the ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP #n Compare the contents of ACC with number n
JPE <address> Following a compare instruction, jump to <address> if the
compare was True
JPN <address> Following a compare instruction, jump to <address> if the
compare was False
OUT Output to the screen the character whose ASCII value is stored in
ACC
END Return control to the operating system
<address> can be an absolute or a symbolic address
# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001101
13
(a) The current contents of main memory and selected values from the ASCII character set are
given.
(i) Trace the program currently in memory using the trace table.
ASCII
Character
value
49 1
50 2
51 3
52 4
65 A
66 B
67 C
68 D
[4]
© UCLES 2022 9618/11/O/N/22 [Turn over
MUHAMMAD ALI KHAN
PAGE 879
14
Instruction
Explanation
Opcode Operand
LDD <address> Direct addressing. Load the contents of the location at the given
address to ACC
STO <address> Store contents of ACC at the given address
LDD 100
STO 165
LDD 101
STO 100
LDD 165
STO 101
...........................................................................................................................................
...........................................................................................................................................
[1]
15
16
(b) The following table shows another part of the instruction set for the processor.
Instruction
Explanation
Opcode Operand
AND #n Bitwise AND operation of the contents of ACC with the operand
AND Bn Bitwise AND operation of the contents of ACC with the binary number n
XOR #n Bitwise XOR operation of the contents of ACC with the operand
XOR Bn Bitwise XOR operation of the contents of ACC with the binary number n
OR #n Bitwise OR operation of the contents of ACC with the operand
OR Bn Bitwise OR operation of the contents of ACC with the binary number n
LSR #n Bits in ACC are shifted logically n places to the right. Zeros are
introduced on the left-hand end
<address> can be an absolute or a symbolic address
# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001101
1 0 0 1 0 0 1 1
XOR B00011111
...........................................................................................................................................
...........................................................................................................................................
[1]
1 0 0 1 0 0 1 1
AND B11110000
...........................................................................................................................................
...........................................................................................................................................
[1]
© UCLES 2022 9618/11/O/N/22
MUHAMMAD ALI KHAN
PAGE 882
17
1 0 0 1 0 0 1 1
OR B11001100
...........................................................................................................................................
...........................................................................................................................................
[1]
(iv) The current contents of the ACC are:
1 0 0 1 0 0 1 1
LSR #2
...........................................................................................................................................
...........................................................................................................................................
[1]
(c) Tick () one or more boxes in each row to indicate whether the task is performed in the first
pass or the second pass of a two-pass assembler.
Remove comments.
[2]
18
7 (a) State two benefits to a programmer of using Dynamic Link Library (DLL) files.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Memory management is one of the tasks performed by an Operating System (OS).
Describe the ways in which memory management organises and allocates Random Access
Memory (RAM).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) An Operating System may include a utility program to compress text files.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(d) Explain the reasons why increasing the amount of cache memory can improve the
performance of a CPU.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(e) State the name of a peripheral device port that provides a physical connection in the computer
for each of these peripherals.
3D printer ..................................................................................................................................
Monitor ......................................................................................................................................
[2]
© UCLES 2022 9618/11/O/N/22
MUHAMMAD ALI KHAN
PAGE 884
19
Describe how Carrier Sense Multiple Access / Collision Detection (CSMA / CD) is used in a bus
network.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
to reorganise files so
virus checker they are contiguous
backup
to initialise a disk
2(a)(i) –106 1
2(a)(ii) 96 1
A B C X
0 0 0 1
0 0 1 0
0 1 0 0
0 1 1 0
1 0 0 0
1 0 1 0
1 1 0 0
1 1 1 0
4(a) data verification is checking if input data is the same as the original whereas 1
data validation is checking that the data is reasonable / sensible
Solution 1:
x removing the many-to-many relationship between Owner and Tree
x ... by removing TreeID and TreePosition from the Owner table
x ... and creating a linking table between Owner and Tree
x ... that contains OwnerID, TreeID and TreePosition
x ... (composite) primary key of the linking table should be OwnerID and
TreeID // insert a named new primary key in the linking table
Solution 2:
x removing the many-to-many relationship between Owner and Tree
x move TreePosition into TREE table
x ... put OwnerID into TREE table
x create a new table with suitable name (for the species of tree)
x ... containing ScientificName, MaxHeight and FastGrowing
x ... with ScientificName as primary key // or another suitable primary key
Option 1:
INSERT INTO
TREE(TreeID, ScientificName, MaxHeight, FastGrowing)
VALUES('LOW_1276', 'Salix_Alba', 30.00, TRUE);
Option 2:
INSERT INTO
TREE
VALUES('LOW_1276', 'Salix_Alba', 30.00, TRUE);
An attribute / field (or set of attributes / fields) that could be a primary key
8(a) 1 mark one or two correct row(s). 2 marks for all three correct rows. 2
10(a) all four computers directly connected to the switch and no other connections. 1
x Device: Server
x Reason: Server processes the requests and authorises traffic // firewall
software on the server authorises traffic // server acts as the proxy
x Device: Switch
x Reason: Switch is connected to all the computers // to share access to
the router on the network
INSTRUCTIONS
Ɣ Answer all questions.
Ɣ Use a black or dark blue pen.
Ɣ Write your name, centre number and candidate number in the boxes at the top of the page.
Ɣ Write your answer to each question in the space provided.
Ɣ Do not use an erasable pen or correction fluid.
Ɣ Do not write on any bar codes.
Ɣ You may use an HB pencil for any diagrams, graphs or rough working.
Ɣ Calculators must not be used in this paper.
INFORMATION
Ɣ The total mark for this paper is 75.
Ɣ The number of marks for each question or part question is shown in brackets [ ].
Ɣ No marks will be awarded for using brand names of software packages or hardware.
DC (PQ/CT) 302752/1
© UCLES 2022 [Turn over
MUHAMMAD ALI KHAN
PAGE 894
1 (a) Draw one line from each utility software to its most appropriate purpose.
to reorganise files so
they are contiguous
virus checker
to scan for malicious
program code
disk formatter
backup
to initialise a disk
disk repair
to create copies of files
in case the original is lost
defragmentation
to check for and fix
inconsistencies on a disk
[5]
(b) Compilers and interpreters translate programs written in a high-level language into a low-level
language.
(i) State two drawbacks of using a compiler compared to an interpreter during program
development.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(ii) Explain why high-level language programs might be partially compiled and partially interpreted.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
© UCLES 2022 9618/12/O/N/22
MUHAMMAD ALI KHAN
PAGE 895
2 (a) (i) Convert the two’s complement binary integer into denary.
10010110
10010110
(iii) Convert the unsigned binary integer into Binary Coded Decimal (BCD). Show your
working.
10010101
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Answer .......................................................
[2]
1 0 0 0 1 1 0 0
+ 0 1 0 0 0 1 1 0
[1]
1 Too high
T Temperature
0 Acceptable
1 Too high
W Wind speed
0 Acceptable
1 Detected
R Rain
0 Not detected
1 On
M Manual override
0 Off
[3]
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[2]
(c) Embedded systems contain Read Only Memory (ROM) and Random Access Memory (RAM).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
4 (a) State the difference between data verification and data validation.
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Describe two other validation methods that can be used to validate non-numeric data.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Write the Structured Query Language (SQL) script to add a new record in the table TREE to
store the following data:
Attribute Value
TreeID LOW_1276
ScientificName Salix_Alba
MaxHeight 30.00
FastGrowing TRUE
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
...................................................................................................................................................
............................................................................................................................................. [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(i) Explain the effect of increasing the sampling rate on the accuracy of the sound recording.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Explain the effect of decreasing the sampling resolution on the file size of the sound
recording.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
10
7 The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
LDD <address> Direct addressing. Load the contents of the location at the given address to
ACC
LDX <address> Indexed addressing. Form the address from <address> + the contents of the
index register. Copy the contents of this calculated address to ACC
LDR #n Immediate addressing. Load the number n to IX
STO <address> Store the contents of ACC at the given address
ADD <address> Add the contents of the given address to the ACC
ADD #n Add the denary number n to the ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
JMP <address> Jump to the given address
CMP <address> Compare the contents of ACC with the contents of <address>
CMI <address> Indirect addressing. The address to be used is at the given address. Compare
the contents of ACC with the contents of this second address
JPE <address> Following a compare instruction, jump to <address> if the compare was True
JPN <address> Following a compare instruction, jump to <address> if the compare was False
END Return control to the operating system
<address> can be an absolute or symbolic address
# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001101
11
(a) Trace the program currently in memory using the trace table, stopping when line 90 is
executed for a second time.
77 CMI 102
78 JPE 91
79 CMP 103
80 JPN 84
81 ADD 101
82 STO 101
83 JMP 86
84 INC ACC
85 STO 101
86 LDD 100
87 INC ACC
88 STO 100
89 INC IX
90 JMP 76
91 END
100 0
101 0
102 112
103 4
110 1
111 4
112 0
[5]
12
(b) The following table shows another part of the instruction set for the processor.
Instruction
Explanation
Opcode Operand
AND #n Bitwise AND operation of the contents of ACC with the operand
AND <address> Bitwise AND operation of the contents of ACC with the contents of <address>
XOR #n Bitwise XOR operation of the contents of ACC with the operand
XOR Bn Bitwise XOR operation of the contents of ACC with the binary number n
XOR <address> Bitwise XOR operation of the contents of ACC with the contents of <address>
OR #n Bitwise OR operation of the contents of ACC with the operand
OR <address> Bitwise OR operation of the contents of ACC with the contents of <address>
LSL #n Bits in ACC are shifted logically n places to the left. Zeros are introduced on
the right-hand end
LSR #n Bits in ACC are shifted logically n places to the right. Zeros are introduced on
the left-hand end
<address> can be an absolute or symbolic address
# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001101
50 01001101
51 10001111
0 1 0 1 0 0 1 1
Show the contents of the ACC after the execution of the following instruction.
XOR B00011111
...........................................................................................................................................
...........................................................................................................................................
[1]
13
0 1 0 1 0 0 1 1
Show the contents of the ACC after the execution of the following instruction.
AND 50
...........................................................................................................................................
...........................................................................................................................................
[1]
0 1 0 1 0 0 1 1
Show the contents of the ACC after the execution of the following instruction.
LSL #3
...........................................................................................................................................
...........................................................................................................................................
[1]
0 1 0 1 0 0 1 1
Show the contents of the ACC after the execution of the following instruction.
OR 51
...........................................................................................................................................
...........................................................................................................................................
[1]
14
(c) Write the register transfer notation for each of the stages in the fetch-execute cycle described
in the table.
15
8 The following bitmap image has a resolution of 4096 × 4096 pixels and a colour depth of 24 bits
per pixel.
The image is displayed on a monitor that has a screen resolution of 1920 × 1080 pixels.
(a) Tick () one box in each row to identify the effect of each action on the image file size.
(b) State two benefits of creating a vector graphic instead of a bitmap image.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
16
(c) A second bitmap image is stored using a colour depth of 8 bits per pixel.
(i) The table shows the compressed and uncompressed values for parts of the image file.
Complete the table. The first row has been completed for you.
32 32 80 81 81
[2]
Explain why lossless compression is more appropriate than lossy compression for a
text file.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
Describe the social impact of using facial recognition software to identify individuals in an airport.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [2]
17
10 A Local Area Network (LAN) consists of four computers, one server and a switch.
(a) Complete the following diagram to show how the hardware is connected.
Switch
[1]
(b) A router is attached to one of the devices on the LAN shown in part (a) to connect the LAN to
the internet.
Device ...............................................................................................................................
Reason ..............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(ii) Describe the role and function of the router in the network.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
to reorganise files so
virus checker they are contiguous
backup
to initialise a disk
2(a)(i) –106 1
2(a)(ii) 96 1
A B C X
0 0 0 1
0 0 1 0
0 1 0 0
0 1 1 0
1 0 0 0
1 0 1 0
1 1 0 0
1 1 1 0
4(a) data verification is checking if input data is the same as the original whereas 1
data validation is checking that the data is reasonable / sensible
Solution 1:
x removing the many-to-many relationship between Owner and Tree
x ... by removing TreeID and TreePosition from the Owner table
x ... and creating a linking table between Owner and Tree
x ... that contains OwnerID, TreeID and TreePosition
x ... (composite) primary key of the linking table should be OwnerID and
TreeID // insert a named new primary key in the linking table
Solution 2:
x removing the many-to-many relationship between Owner and Tree
x move TreePosition into TREE table
x ... put OwnerID into TREE table
x create a new table with suitable name (for the species of tree)
x ... containing ScientificName, MaxHeight and FastGrowing
x ... with ScientificName as primary key // or another suitable primary key
Option 1:
INSERT INTO
TREE(TreeID, ScientificName, MaxHeight, FastGrowing)
VALUES('LOW_1276', 'Salix_Alba', 30.00, TRUE);
Option 2:
INSERT INTO
TREE
VALUES('LOW_1276', 'Salix_Alba', 30.00, TRUE);
An attribute / field (or set of attributes / fields) that could be a primary key
8(a) 1 mark one or two correct row(s). 2 marks for all three correct rows. 2
10(a) all four computers directly connected to the switch and no other connections. 1
x Device: Server
x Reason: Server processes the requests and authorises traffic // firewall
software on the server authorises traffic // server acts as the proxy
x Device: Switch
x Reason: Switch is connected to all the computers // to share access to
the router on the network