June 2016 AS Paper 1 (With MS)
June 2016 AS Paper 1 (With MS)
Candidate Candidate
forename surname
INSTRUCTIONS TO CANDIDATES
• Write your name, centre number and candidate number in the boxes above. Please write clearly and in capital letters.
• Use black ink. HB pencil may be used for graphs and diagrams only.
• Answer all the questions, unless your teacher tells you otherwise.
• Read each question carefully. Make sure you know what you have to do before starting your answer.
• Where space is provided below the question, please write your answer there.
• You may use additional paper, or a specific Answer sheet if one is provided, but you must clearly show your candidate
number, centre number and question number(s).
Producing CGI requires lots of processing power and so the company has a large number of high-performance
computers.
Explain why See And Believe would use a distributed operating system.
[3]
(b). The processors in the company's powerful computers have fast clock speeds and large amounts of cache
memory. Describe how each of these improves the processor's performance:
[2]
[2]
Discuss to what extent each of the following laws is intended to address the issue of someone accessing and
distributing clips of the film online:
[9]
Elegant Bags puts its website on its servers which are given a public IP address. It also purchases the domain
name elegantbagsonline.co.uk.
Explain the automated process that takes place that allows customers to access the site when they enter the
domain name into their browser.
[3]
(b). The company's handbags come in a variety of materials. It would like visitors to its website to be able to select
different materials in their browser and for the image shown to then instantly change to one of a handbag made
of the selected material.
Explain how the website developer would implement this. You are not expected to write any code.
[4]
(i) State one ethical issue the company may have considered when designing its website.
[1]
(ii) State one action the company could take to address the ethical issue identified in part (i).
[1]
[2]
(b). A numeric PIN code entered into the burglar alarm is compared with the code stored at the memory location
passcode.
If the codes match, the program jumps to the part of the program labelled deactivate.
If the codes do not match, the program jumps to the part of the program labelled alarm.
Write the LMC code to meet the requirements above. (You don't have to write the code for labels deactivate
and alarm, as you can assume this has already been written elsewhere.)
[4]
[2]
(b). Describe what is meant by the term ‘lossy compression’.
[2]
(c). When a video is selected, the program gives an estimate of the file size of the converted video. The estimate in
kilobytes is calculated by multiplying:
Write a function in pseudocode that estimates the size of a converted video. It should:take in 3 parameters:
pixels, framesPerSec, lengthMins
Examples:
480000 pixels at 24 frames per second for 60 minutes will return a size of 898.56 MB
480000 pixels at 24 frames per second for 120 minutes will return a size of 1.797 GB.
* Discuss the benefits and drawbacks of the three options above and justify which option you would recommend.
[9]
[2]
(b). Represent the number 55 in normalised floating point binary notation, using 8 bits for the mantissa followed by 8
bits for the exponent, both in two's complement binary.
[2]
(c). Represent the number 55 in normalised floating point binary notation, with the mantissa and exponent both in
two's complement binary, using as few bits as possible.
[2]
(d). State why a programmer might choose to declare a variable as a floating point number.
[1]
The company's technicians keep accurate records of the printers in the building, and the quantity of toner
cartridges in stock, in a flat file database. An extract of the database is shown in Fig. 1.
Fig. 1
Describe two issues, referring to Fig. 1, that might arise from using a flat file database structure.
[4]
PrinterModel: this stores all the data about each model of printer
PrinterInstance: this stores the data about each individual printer in the building
Cartridge: this stores information about the toner cartridges.
Draw an entity-relationship diagram to show the relationships between the three tables.
[4]
(c). Most of the printers have their own on-board RAM.
[1]
When items are scanned in at the checkout they are stored in a 2-dimensional array called purchases, which
stores the item name, category and price.
Examples of the array and corresponding receipt are shown in Fig. 2 and Fig. 3.
[6]
1 a Any 2 from: 3
Examiner's Comments
Allow multiple computers / resources…
(AO1.1) Few candidates gained full marks on this
To be treated as one / work on the question. Many candidates described
same problem (AO1.1) general characteristics of a network
operating system rather than a distributed
1 from: operating system. Fewer appropriately
related their explanation to the scenario.
Meaning all the computers can work on
producing the same special effect.
(AO2.1)
c Mark Band 3–High Level (7-9 marks) 9 AO1: Knowledge and Understanding
The candidate demonstrates a thorough The following is indicative of possible that
knowledge and understanding of to what candidates may refer to but is not
extent all three of the laws apply to this prescriptive or exhaustive:
scenario; the material is generally accurate
and detailed. The candidate is able to Any individual or organisation that
apply their knowledge and understanding produces media has their ownership of that
directly and consistently to the context media protected by the Copyright, Designs
provided. Evidence / examples will be and Patents Act. (Accept Copyright Act)
explicitly relevant to the explanation. The This means other parties are not allowed to
candidate provides a thorough discussion reproduce or redistribute it without
which is well-balanced. Evaluative permission.
comments are consistently relevant and
well-considered.
Examiner's Comments
Total 16
b Page will include JavaScript (which 4 Allow alternative solution using JQuery or
allows page content to be dynamic) other library / plug-ins.
(AO2.2)
Accept AJAX can be used to prevent all
(1 per -, Max 1) images having to be pre-loaded.
Plus
Credit ‘replaces / changes previous picture
When a material is selected with new picture’ with BP 3 and 4 (i.e. 2
(JavaScript) code can be marks)
executed…(AO3.1)
…the appropriate picture is Examiner's Comments
shown…(AO3.1)
…and hides the original picture. Many candidates gained credit for correctly
(AO3.1) identifying that the change of image could
(1 per -, Max 3) be implemented using Javascript (or
similar). However, as with the previous
question many candidates then found it
difficult to explain how this could be
implemented. Too many candidates
rewrote the content of the question.
c i Ensuring the site is accessible to all. 1 Accept any other sensible consideration
and measure providing the measure is
OR ethical and not legal.
(Though the two aren't necessarily
Ensuring customers' data is stored mutually exclusive).
securely.
Total 9
Total 6
Examiner's Comments
d Mark Band 3–High Level (7-9 marks) 9 AO1: Knowledge and Understanding
The candidate demonstrates a thorough The following is indicative of possible that
knowledge and understanding of a wide candidates may refer to but is not
range of the technical issues the coding prescriptive or exhaustive:
team might have considered; the material Java
is generally accurate and detailed. The One version needs be written and can be
candidate is able to apply their knowledge used on any device / OS combination that
and understanding directly and consistently has the Java Virtual Machine rather than
to the context provided and come to a well having to write multiple versions.
argued conclusion. Evidence / examples Code running on a VM tends to be slower
will be explicitly relevant to the explanation. than compiled.
The candidate provides a thorough C++
discussion which is well-balanced. Multiple versions of the code will need to
Evaluative comments are consistently be maintained for different architectures…
relevant and well-considered. …however there may be minimal
differences between them, and then just
There is a well-developed line of reasoning need compiling with different compilers.
which is clear and logically structured. The
information presented is relevant and Program will run quicker than alternatives.
substantiated.
JavaScript
Mark Band 2 –Mid Level (4-6 marks) As interpreted likely to be by far the
The candidate demonstrates reasonable slowest option.
knowledge and understanding of the Will run in any browser.
technical issues the coding team might
have considered; the material is generally AO2: Application
accurate but at times underdeveloped. The The selected knowledge / examples should
candidate is able to apply their knowledge be directly related to the specific question.
and understanding directly to the context The following is indicative of possible
provided although one or two opportunities factors / evidence that candidates may
are missed. A reasoned conclusion is refer to but is not prescriptive or
drawn. Evidence / examples are for the exhaustive:
most part implicitly relevant to the
explanation The candidate provides a Java
reasonable discussion, the majority of Multiple devices can include devices other
which is focused. Evaluative comments are than PCs (i.e. phones, tablets).
for the most part appropriate, although one People with unusual operating systems or
or two opportunities for development are architectures would have access to the
missed. application.
There is a line of reasoning presented with It makes commercial sense to sell to as
some structure. The information presented wide an audience as possible.
is in the most part relevant and supported The speed reduction compared to
by some evidence. compiled code will likely be noticeable with
such a processor intensive task.
Mark Band 1-Low Level (1-3 marks) As running on a VM coders will have
The candidate demonstrates a basic limited (if any) access to some of the low
knowledge of the technical issues the level features (e.g. access to the GPU)
coding team might have considered with which can optimise the program.
limited understanding shown; the material Intermediate code is used helping protect
JavaScript
Most people have web browsers so by far
most compatible option (don't even need
VM).
The slow speed may be frustrating…
…though as no user interaction is needed
this may be a trade off worth making.
Source code is visible (though can be
obfuscated) meaning it can easily be
copied and amended.
AO3: Evaluation
Candidate has used the points above to
justify their choice of language.
Examiner's Comments
Total 17
5 a 00110111 2
(1 mark per nibble) Examiner's Comments
b 01101110 00000110 2
Examiner's Comments
(1 mark for mantissa, 1 for exponent)
Few candidates achieved full marks on this
question. Many represented a normalised
floating point mantissa with two of the
same bit at the start.
c 0110111 0110 2
Examiner's Comments
(1 mark for mantissa, 1 for exponent)
Few candidates achieved full marks on this
question. Many reduced the number of bits
by deleting the leading zero's, rendering
the result negative.
Total 7
c Storing documents being / waiting to 1 Accept ‘storing information about print jobs'
be printed.
reduced buffering Examiner's Comments
Total 9
Examiner's Comments
Total 6