0% found this document useful (0 votes)
889 views53 pages

1.7 Ethics and Ownership

Ethics and Ownership

Uploaded by

Sooraj Rajmohan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
889 views53 pages

1.7 Ethics and Ownership

Ethics and Ownership

Uploaded by

Sooraj Rajmohan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 53

AS LEVELS 9618

COMPUTER SCI ENCE ETHICS


Compiled: By Engr. Shahzadah Ashraf
Bande’Shah AND
OWNERSHIP

Notes + Topical Past


Papers + Marking Scheme

STUDENTS NAME:

SCHOOL NAME:
shahzadah.ashraf 03332076121
@gmail.com

DATE ISSUED: Follow On Facebook :


https://www.facebook.com/shahzad
ah.ashraf

For More Resources:


CONTACT NUMBER: https://sites.google.com/site/alevelco
mputers/home

A Levels With
Sir Bande'Shah

Page 1 of 52
Cambridge International AS & A Level Computer Science 9618 syllabus for 2021, 2022 and 2023.  Subject content

7 Ethics and Ownership


7.1 Ethics and Ownership
Candidates should be able to: Notes and guidance
Show understanding of the need for and purpose of Understand the importance of joining a professional
ethics as a computing professional ethical body including BCS (British Computer Society),
IEEE (Institute of Electrical and Electronic Engineers)
Show understanding of the need to act ethically and
the impact of acting ethically or unethically for a
given situation
Show understanding of the need for copyright
legislation
Show understanding of the different types of software Licences to include free Software Foundation, the
licencing and justify the use of a licence for a given Open Source Initiative, shareware and commercial
situation software
Show understanding of Artificial Intelligence (AI) Understand the impact of AI including social,
economic and environmental issues
Understand the applications of AI

Page 2 of 52
Page 3 of 52
Chapter 7 Ethics and Ownership
Artificial intelligence (AI)
Artificial intelligence (AI) depends on and draws from many other disciplines including: philosophy,
psychology, neuroscience, mathematics, linguistics and control engineering. The only definitions of AI
that are acceptable are at the same time so generalized that they are not very practical. The following
is a typical example:

AI concerns the use of a computer or computer-controlled device to perform tasks normally associated
with intelligent behavior by humans.
We will consider five aspects of intelligent human behavior and discuss some applications of AI that
mimic this human behavior.

Problem solving

One example is the development of a system that can play chess. This can be considered as displaying
artificial intelligence but this is only demonstrated because the rules of chess are limited. A computer
with sufficient storage capacity and processing power can investigate so many options for a possible
sequence of moves that a human cannot compete.

A second example is the traditional form of expert system that, for example, has been developed to
aid medical diagnosis. This is supplied with data and rules from living medical experts. The expert
system contains more knowledge than is possible for an individual doctor to have. However, if the
expert system is given a new situation that is not covered by the data and rules it has been given, it
cannot attempt a new or creative approach – unlike a human.

Linguistics

Voice recognition and voice synthesis techniques are already developed and in use. One example is if
you phone a help line where you might be answered by a computer. Provided that you answer
questions clearly the computer might be able to identify your needs and pass you on to an appropriate
human who can help. However, this is a long way away from the computer itself creating new
questions based on your answers and providing the help you need.

Perception

Traditionally robots have been used in manufacturing processes. Here the robot is programmed to
perform repetitive tasks. The action of the robot each time is triggered by some mechanism. However,
if anything unexpected happens the robot continues to operate as normal, regardless of any damage
being caused.

There is now much research focused on the development of autonomous robots. These have to be
fitted with sensors to enable the robot to take appropriate action depending on the information
received from the sensors. This is an example of perception in AI.

A development of this concept is the driverless car. There are several examples available or in
development but so far they have only been able to perform limited tasks. An example is the capability
for a car to park itself in a vacant parking space.

Page 4 of 52
Reasoning

There are examples of the application of AI where a program has been able to draw inferences (reach
conclusions based on evidence) which is a requirement for reasoning. The best examples concern the
proving of mathematical theorems. Attempts have also been made to develop techniques that can
verify that software that has been created does indeed correctly and fully match the documented
specification.

Learning

This is currently a very active area for the application of AI techniques. Machine learning is said to take
place if a system that has a task to perform is seen to improve its performance as it gains experience.
The AI system has access to ‘experience’ in the form of a massive set of data. By the use of appropriate
statistical algorithms the system learns from this data.

One example is when the actions of users visiting websites to buy products are stored. The AI system
then attempts to identify appropriate products to be advertised when a user returns to the website.
If sales progressively increase there is evidence that learning is taking place.

Another example is the program that investigates incoming emails and makes decisions as to whether
these can be classified as spam and therefore should be refused entry to the user inbox.

The impact of AI

The use of the Internet dominates the lives of a large proportion of the world’s population. Global
organizations that provide the systems underpinning this user activity are collecting and storing
massive amounts of data concerning how the Internet is being used. If this data is only being used to
enable the organization to increase its profits, this could be seen as normal business practice.
However, if the data is not being securely stored it could get into the wrong hands and be used for
criminal or subversive activity.

There are different concerns with respect to the introduction of autonomous mechanical products
such as robots, robotic devices and driverless vehicles into our daily lives. There are arguments that
technological developments lead to employment of more people to manufacture, service and install
the new products. There is a further argument that more technology leads to less manual labour and
therefore to increased leisure time. One counter argument is that more technology leads to fewer
jobs because machines are doing the work. Another is that such developments simply make the rich
richer and the poor poorer.
Some people are excited by the introduction of driverless vehicles, but other people believe that the
potential for accidents will be increased and that there are not enough measures to prevent accidents.
Robots can be used in environments that would be dangerous for humans to enter. Giving the robot
the capability to act autonomously would make it more useful in such environments.

The environmental impact of robot manufacture and disposal is probably the most significant issue.
Robots are manufactured and require materials for their construction. There is only a limited supply
of the raw materials needed. Also, all mechanical and electronic devices eventually end up on the
scrap heap contributing to the already serious problem of waste products harming the environment
and creatures living in this environment.

The use of improved expert systems to aid practicing doctors and nurses is clearly a benefit. However,
if these systems came to replace doctors and nurses the social consequences are difficult to predict.

Page 5 of 52
1.7.1 Ethics And The Computing Professional

Computer Ethics. Ethics is a set of moral principles that govern


the behavior of a group or individual. Therefore, computer ethics is set
of moral principles that regulate the use of computers.
Or
Computer ethics is a part of practical philosophy concerned with
how computing professionals should make decisions regarding
professional and social conduct.

Code Of Conduct

A Code of Conduct is not law, but it is a set of rules that apply when you
are in an organization such as your college. Examples might include "Don't
look at pornography at work". This would be legal at home, but if you did it at work you could be sacked. In
addition, a code of conduct may contain laws such as "Don't install pirated software".
The British Computer Society has produced a list of standards for the training and development of
Information Technology workers.
It covers the following issues:

 The Public Interest - safeguarding public health; respecting rights of 3rd parties, applying a
knowledge of relevant regulation.

 Duty to employers and clients - carrying out work according to the requirements, and not abusing
employers' or clients' trust in any way.

 Professional duty - uphold the reputation of the profession through good practice, support fellow
members in professional development

 Professional Integrity and Competence - maintain standards of professional skill and practice,
accepting responsibility for work done, avoiding conflicts of interest with clients.

An example of a code of conduct in use in an office is as follows:

 Don't play games


 Don't look at pornography
 Don't gamble
 Don't plug your own peripherals into your computer
 Don't install software on work machines without permission

Each of these might be perfectly legal at home, but they might get you sacked at work
“Codes of Conduct may also include laws, as a way of reminding employees what is legal and what isn't
legal”

Page 6 of 52
IEEE CS/ACM Code of Ethics and Professional Practice

The Software Engineering Code of Ethics and Professional Practice, produced by the Institution of Electrical
and Electronic Engineers Computer Society (IEEE CS) and the Association for Computing Machinery (ACM),
acts as a professional standard for teaching and practicing software engineering. It specifies ethical and
professional obligations of software engineers and states the standards that standards society at large
expects them to meet and what they should expect of one another. The code also tells the public what
they should expect from software engineers. The code was produced by a multinational task force which
considered input from a variety of sources including industrial, government and military installations and
educational professions. An informative article of about the development of the code, which includes a full
copy of the code itself was published in the October 1999 issue of ACM Computer.

According to the shortened version of the code:

Software engineers shall commit themselves to making the analysis, specification, design,
development, testing and maintenance of software a beneficial and respected profession. In
accordance with their commitment to the health, safety and welfare of the public, software
engineers shall adhere to the following Eight Principles:

Public: Software engineers shall act consistently with the public interest.

Client and Employer: Software engineers shall act in a manner that is in the best interests of their client
and employer, consistent with the public interest.

Product: Software engineers shall ensure that their products and related modifications meet the highest
professional standards possible.

Judgment: Software engineers shall maintain integrity and independence in their professional judgment.

Management: Software engineering managers and leaders shall subscribe to and promote an ethical
approach to the management of software development and maintenance.

Profession: Software engineers shall advance the integrity and reputation of the profession consistent
with the public interest.

Colleagues: Software engineers shall be fair to and supportive of their colleagues.

Self: Software engineers shall participate in lifelong learning regarding the practice of their profession and
shall promote an ethical approach to the practice of the profession.

Page 7 of 52
1.7.2 Ownership of software and data

Ownership of copyright

Copyright is generally owned by the creator of the work in the first instance. However, copyright
ownership depends on a number of different things such as the type of work created or how the work was
created, for example by an employee as part of their job.

Owners hold specific rights but not all rights.

The law grants to owners a set of specified rights: reproduction of works; distribution of copies; making of
derivative works; and the public performance and display of works. Some artworks have "moral
rights" regarding the name of the artist on the work, or preventing destruction of some works. Owners
may also have rights to prevent anyone from circumventing technological protection systems that control
access to the works.

Author is the copyright owner.

As a general rule, the initial owner of the copyright is the person who does the creative work. If you wrote
the book or took the photograph, you are the copyright owner.

Employer may be the copyright owner.

If you created the work as an employee, acting within the scope of your employment, the work may be
a "work made for hire." In that event, the copyright owner is the employer. If you are an employee, and
your job is to create software code, the copyright probably belongs to your employer.

Copyrights can be transferred.

The law may make you or your employer the copyright owner, but the law also allows the owner
to transfer the copyright. With a written and signed instrument, your employer can give you the
copyright. In the academic setting, we are frequently asked to transfer copyrights in our books and articles
to publishers. The ability to transfer or retain our copyrights is an opportunity to be good stewards of our
intellectual works.

Copyright owners may allow public uses.

A copyright owner may grant rights to the public to use a protected work. That grant could be a simple
statement on the work explaining the allowed uses, or it may be a selection of a Creative
Commons license. Similarly, the movement to make works "open access" or "open source" is a choice by
the owner of rights to make works available to the public.

Page 8 of 52
Legislation

The way you use data and computers is subject to the law of the country you are living in. Across the world
different countries have different laws, for the exam you only need to learn about the laws that affect the
United Kingdom.
You must be familiar with the following legislation:

Copyright

Software copyright refers to the law regarding the copying of computer software. Many companies and
individuals write software and sell it for money, these products are copyrighted and you cannot copy the
code or the program without the permission of the maker. This, they believe protects the work of the
programmers, rewarding them for their efforts

Copyright symbol Public domain symbol Copy-Left symbol

Other companies and individuals release software under Free and Open Source software (FOSS) licenses.
These licenses allow users the right to use, study, change, and improve a program's design through the
availability of its source code. Some adherents of FOSS believe it creates better software in the long term,
and others believe that no software should be copyrighted. FOSS licensed products are heavily used in
running the World Wide Web and in the creation of popular websites such as Facebook. Open Source
licenses generally mean that if you create software that makes changes to open source code, and choose
to release it, you must release your new code under the same Open Source license, this is called Copy-Left.
Some free software is in the public domain, meaning that you can use it for whatever purpose you wish, if
you make a software product involving changes to public domain sources code, you don't have to release
your code into the public domain.

Copyright in most works lasts until 70 years after the death of the creator if known, otherwise 70 years
after the work was created or published (fifty years for computer-generated works).

 In summary the act specifies that users are not allowed to:
 use copyright material without permission
 use patented design without permission
 edit programs without permission
 copy or distribute software when you don't have permission

Page 9 of 52
Computer Misuse Act 1990

Personal Data - data that can be used to identify a living individual

The Computer Misuse Act 1990 deals with people who crack computer programs or systems. Crimes might
include removing the Copyright protective measures from a commercial software product, breaking into a
school database to change grades, hacking into a companies' website and stealing customer credit card
details, creating viruses and Trojans, and so on. It was recognized in the late 1980s that the increase in
business and home use of computers required legislation in order to protect against their exploitation. To
this end, in 1990 the Computer Misuse Act was established.
Under the act, three new offences were created:

It prohibits:

 unauthorized access to computer material


It must be shown that the perpetrator accessed the data, that they were unauthorized, and that
they knew they were unauthorized.

 unauthorized access with intent to commit or facilitate commission of further offences


To prove ulterior intent, it must be shown that they wished to use the information in order to
commit a further offence.

 unauthorized modification of computer material


Unauthorized modification also includes deliberate introduction of a virus onto a computer system.

"Obtaining access" means; "Causing the computer to perform any action the results in it": Copying/moving
data, Erasing/altering data, using a program; or causing the computer to output programs or data.

A difficulty with computer crime is that it can cross physical and national borders, the Computer Misuse
Act recognizes this fact and gives British Courts the jurisdiction where a "significant link" with Britain can be
demonstrated in instances of computer-related crime. America has its own Computer Fraud and Abuse
Act.

Page 10 of 52
Data Protection Act 1998

The Data Protection Act 1998 controls the way that companies, organizations and individuals handle
personal data. It states that:

1. Data may only be used for the specific purposes for which it was collected.

2. Data must not be disclosed to other parties without the consent of the individual whom it is about,
unless there is legislation or other overriding legitimate reason to share the information (for
example, the prevention or detection of crime). It is an offence for Other Parties to obtain this
personal data without authorization.

3. Individuals have a right of access to the information held about them, subject to certain exceptions
(for example, information held for the prevention or detection of crime).

4. Personal information may be kept for no longer than is necessary and must be kept up to date.

5. Personal information may not be sent outside the European Economic Area unless the individual
whom it is about has consented or adequate protection is in place, for example by the use of a
prescribed form of contract to govern the transmission of the data.

6. Subject to some exceptions for organizations that only do very simple processing, and for domestic
use, all entities that process personal information must register with the Information
Commissioner's Office.

7. The departments of a company that are holding personal information are required to have
adequate security measures in place. Those include technical measures (such as firewalls) and
organizational measures (such as staff training).

8. Subjects have the right to have factually incorrect information corrected (note: this does not extend
to matters of opinion)

Page 11 of 52
Regulation of Investigatory Powers Act 2000

The Regulation of Investigatory Powers Act was passed in 2000, and introduces the power to intercept
communications with the aim of taking into account the growth of the Internet. It regulates the manner in
which certain public bodies may conduct surveillance and access a person's electronic communications.
Supporters of the act claimed this was an excuse to introduce new measures, some of these included being
able to force someone to reveal a cryptographic key for their data, with failure to do so resulting in up to 2
years imprisonment. As we have seen in packet switching, data can be read in transit between hosts.
However, the act goes further than allowing this:

 enables certain public bodies to demand that an ISP provide access to a customer's
communications in secret;

 enables mass surveillance of communications in transit;

 enables certain public bodies to demand ISPs fit equipment to facilitate surveillance;

 enables certain public bodies to demand that someone hand over keys to protected information;

 allows certain public bodies to monitor people's internet activities;

 Prevents the existence of interception warrants and any data collected with them from being
revealed in court.

Software License

A software license is a legally binding agreement that specifies the terms of use for an application and
defines the rights of the software producer and of the end-user.

All software must be legally licensed before it may be installed. Proof of purchase (purchase orders,
receipts, invoices or similar documentation are acceptable) must be maintained by individuals or
departments.

Software licensing can be a confusing subject. There are different types of licenses and licensing contracts,
and different vendors may use different terms to describe their licenses. Here are some key terms to help
you navigate through these murky waters.

1. Freeware

In general, freeware is available at no cost and with no restrictions. Freeware tends to be simple software
designed to perform one or two tasks.

2. Shareware

Shareware is free to try out. You usually have to pay if you want to continue using it. Some shareware
relies on the honesty of users to pay up when they should.

Page 12 of 52
3. Open source business software

Open source software can be freely adapted by anyone with the knowledge and inclination to do so. The
open source system has created many useful pieces of software that are the product of loose collaboration
between many people, all over the world.

Commercial/Proprietary Software

Proprietary software consists of software that is licensed by the copyright holder under very specific
conditions. In general, you can use the software, but you are not allowed to modify the software or
distribute it to others.

Many proprietary software applications are also commercial, meaning that you have to pay for a license.
However, many other proprietary software applications are free. The fact that software is free does not
mean it is not proprietary.

Page 13 of 52
Page 14 of 52
5 Three types of software licensing and four descriptions are shown in the table below.

Put a tick (✓) in each row to match each description to the appropriate type of software licensing.

Type of software

Description Open source Shareware Commercial

Software is purchased
before it can be used
Source code comes with
the software
Software is provided free
on a trial basis

The software can be


modified by the user

[4]

6 A team of software engineers is developing a new e-commerce program for a client.

State three of the principles of the ACM/IEEE Software Engineering Code of Ethics. Illustrate
each one, with an example, describing how it will influence their working practices.

1 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

9608/12/M/J/16 Page 15 of 52
3 A company needs new software to manage its accounts. It is evaluating two different options. One
option is open source software and the other is commercial software.

(a) Explain what is meant by open source software.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Explain what is meant by commercial software.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) The company has decided to purchase commercial software.

Identify four benefits to the company in choosing the commercial software option.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...............................................................................................................................................[4]

9608/13/M/J/16 Page 16 of 52
4

2 A software company produces software and distributes it under different software licences.

(a) Four descriptions of software licences are given.

Write the type of software licence that best fits each description. Use a different type of licence
for each description.

1. The software can be legally used, only after a fee has been paid.

Licence type .............................................................................................................................

2. The source code comes with the software. If the software is modified, the edited source
code must be released under the same conditions as the original software.

Licence type .............................................................................................................................

3. The software is free for a trial period and then a fee is requested, or expected, if the user
wants to continue to use the software.

Licence type .............................................................................................................................

4. The source code comes with the software. The software is free to be downloaded, edited,
and distributed, possibly without restriction.

Licence type .............................................................................................................................


[4]

(b) The software company stores information about customers and the software licences they
have purchased. The company considers a file-based approach for the storage and retrieval
of data.

(i) Give three limitations of a file-based approach to store the data.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2019 9608/11/M/J/19 Page 17 of 52


8

4 A software developer works in a team for a large software development company.

(a) Two principles of the ACM/IEEE Software Engineering Code of Ethics are:

• developers must act consistently with the public interest


• developers must act in the best interest of their client and employer.

Name and describe three other principles in the ACM/IEEE Software Engineering Code of
Ethics.

Principle 1 .................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Principle 2 .................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Principle 3 .................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

(b) The software development company uses data backup and disk-mirroring to keep their data
secure.

Explain how data backup and disk-mirroring allow the company to recover from data loss.

Data backup .............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Disk-mirroring ...........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

................................................................................................................................................... [4]

© UCLES 2019 9608/11/M/J/19 Page 18 of 52


10

(c) Shazia’s computer has Dynamic RAM (DRAM) and Static RAM (SRAM).

Explain the differences between Dynamic RAM and Static RAM.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(d) Shazia wants to make sure her computer program is copyrighted.

(i) Define the term copyright.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Shazia does not want to release the software as open source.

Explain why Shazia does not want to use an open source licence.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) Name and describe two software licences, other than open source that Shazia could
use.

Licence 1 ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Licence 2 ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2019 9608/12/M/J/19 Page 19 of 52


6

(d) One principle of the ACM/IEEE Software Engineering Code of Ethics is to always act in the
best interest of the client.

Explain how Frankie can ensure that he is acting in the best interest of his client.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(e) When the program is complete, Frankie uses a compiler to prepare the program for the client.

Explain why Frankie uses a compiler instead of an interpreter.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 9608/13/M/J/19 Page 20 of 52


6

4 Sophie is about to start a new job as a junior software developer.

(a) She is worried about joining a new team of people.

(i) State one ethical action that Sophie can take to help her to feel more confident about
starting work.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) State two ethical actions that Sophie’s manager can take to help Sophie to feel more
confident about starting work.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(iii) State one ethical action that Sophie’s new colleagues can take to help Sophie to feel
more confident about starting work.

...........................................................................................................................................

..................................................................................................................................... [1]

(b) Explain why Sophie is asked to sign a professional code of conduct before starting work.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2020 9608/12/M/J/20 Page 21 of 52


8

(c) Annchi needs to decide which type of software licence to use for the game.

(i) Give two benefits to Annchi of using a commercial licence.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(ii) Give one benefit to the customers of the game being released using a commercial
licence.

...........................................................................................................................................

..................................................................................................................................... [1]

(iii) Describe one benefit to the customers of the game being released using a shareware
licence.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2020 9608/13/M/J/20 Page 22 of 52


9

5 Wei is developing a program.

(a) He wants to make sure the source code is secure on his laptop.

Explain how encrypting the source code can keep it secure.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Wei wants to compress the source code to transport it to another computer.

Identify the most appropriate compression technique he should use.

Justify your choice.

Compression technique ............................................................................................................

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2020 9608/13/M/J/20 Page 23 of 52


5 Bobby is a senior programmer at a software house which produces intruder detection software.
He also runs his own software company which develops and sells various computer applications.

The following table shows seven activities which Bobby carries out.

Put a tick (✓) in the appropriate column to identify if the activity is ethical or unethical.

Activity Ethical Unethical


gives away passwords used in the intruder detection
software
uses source code developed at the software house for
the software he develops for his own company

insists that staff work to deadlines

turns down training opportunities offered by his


employer
writes and sells software that reads confidential data
from client computers

fakes test results of safety-critical software

has the software applications developed overseas for


sale in his own country
[7]

9608/12/O/N/15 Page 24 of 52
4 Paul works part-time for a large software company. The company sells security software to
a number of banks. He also runs his own software company that produces and sells computer
games.

Six statements about computer ethics are shown below.

Draw lines to indicate whether each statement describes ethical or unethical behaviour.

Statement

To save time, Paul fakes the test results


when testing the bank security software.

Paul uses the software developed in his


day job to help write some of the games
software routines.

Ethical

To allow him to concentrate on his games


software, Paul has frequently turned down
job opportunities in his day job.

To make the games software more


realistic, Paul uses password protection
code used in the bank security software.

Unethical
Because his work load is increasing, Paul
is now using overseas companies to write
some of the routines used in his games
software.

Paul carries out training on how to write


games software in his spare time.

[6]

9608/13/O/N/15 Page 25 of 52
5 The IEEE Software Engineering Code of Ethics uses eight key principles shown in the right-hand
column of the following diagram.

Tom is employed as a tester with a software company. He is keen to become a trainee programmer.

The middle column in the diagram labels six incidents which have happened to Tom this week.
The table that follows the diagram describes each incident.

IEEE category

Public

Incident A Client and Employer


Ethical
Incident B Product
behaviour

Incident C Judgement

Incident D Management

Unethical Incident E Profession


behaviour
Incident F Colleagues

Self

Incident Description
Tom has received some phishing emails. He reported this to the bank they were
A
supposed to have come from.
B Tom has asked his manager if they will pay for him to attend a programming course.
Tom is testing beta versions of new games software at work. He copies the software on
C
to CD-Rs and sells them to his friends.
D Tom has completed the application forms to join the Chartered Institute for IT.
Tom finds it difficult to work with one of his colleagues. His way of dealing with this has
E
been to refuse to speak with the colleague.
Tom’s manager had considered the testing of a new game was completed. Tom reported
F
to his manager that he thought there were still bugs which needed to be rectified.

(a) Draw a line on the diagram to link each of the six incidents to either ethical behaviour or
unethical behaviour. [2]

(b) Consider each incident you have identified as ethical behaviour.


[4]
Draw a line from each incident to indicate the IEEE category it maps to.
9608/12/O/N/17 Page 26 of 52
6 Raj has joined a software company as a trainee programmer. He was given the company’s Code
of Conduct document during his induction training. The handbook has a section headed ‘Ethical
Behaviour’.

(a) Describe what is meant by ethics.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Raj is assigned to work as a new member of a development team.

In his first week, Raj feels uncomfortable working with one of his colleagues. He is unfamiliar
with the programming language used by the team. Next week, he will be working on the site
of one of the company’s clients with a colleague. Raj is very nervous about working in an
unfamiliar workplace.

Raj has a review with his manager after his first three weeks.

The Code of Conduct document was produced by the Human Resources section. It closely
follows the ACM/IEEE Software Engineering Code of Ethics that uses these eight key
principles:

Public Client and Employer Product Judgement

Management Profession Colleagues Self

There are issues Raj will want to raise with his manager.

• Describe two of these issues.


• Circle the key ACM/IEEE principle this comes under.
• Suggest what action should be taken to demonstrate ethical behaviour.

Issue 1

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

ACM/IEEE principle (Circle one only)

Public Client and Employer Product Judgement

Management Profession Colleagues Self

Possible action .........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

9608/13/O/N/17 Page 27 of 52
Issue 2

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

ACM/IEEE principle (Circle one only)

Public Client and Employer Product Judgement

Management Profession Colleagues Self

Possible action .........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

9608/13/O/N/17 Page 28 of 52
9

5 Mica has created some software and has copyrighted it. She wants to stop other people from
copying and changing it illegally.

(a) Identify two ways Mica can prevent illegal copies of the software being installed.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Identify one way Mica can distribute the software without the source code.

...................................................................................................................................................

............................................................................................................................................. [1]

(c) Mica is releasing the software under a commercial licence.

(i) Give two benefits to Mica of using a commercial licence.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

(ii) Name two other types of software licence.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2019 9608/12/O/N/19 Page 29 of 52


7

3 Ria manages a team of software developers. The team is creating a mobile application game for a
client.

Ria wants to ensure that her team works to the ACM/IEEE Software Engineering Code of Ethics.

(a) Explain the ways in which Ria and her team can ensure that they follow the Code of Ethics in
relation to the product and their colleagues.

(i) Product

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Colleagues

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(b) Ria’s client wants to sell the game for a profit. The client cannot decide which type of software
licence to use to distribute the game.

Identify two types of licence that Ria could recommend to her client and justify the use of
each licence.

Licence 1 ..................................................................................................................................

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Licence 2 ..................................................................................................................................

Justification ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2020 9608/11/O/N/20 Page 30 of 52


12

6 Malika has started a new job as a trainee software engineer.

(a) Malika’s manager has asked her to work with a senior software engineer for the first week.

Explain the ways in which Malika’s manager has acted ethically.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Malika researched the company and the programming languages used by the company
before she started the job.

Explain the ways in which Malika has acted ethically.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) Malika thinks that her colleagues do not like her, so she asks her manager for help.

Describe the actions the manager could take to support Malika in an ethical way.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2020 9608/12/O/N/20 Page 31 of 52


11

6 Lara is managing a team of software developers who are writing a computer program.

(a) Benedict is one of the developers. He is struggling to keep up with his workload.

Describe the ways in which Lara can ethically support Benedict.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Lara has identified that when a specific sequence of actions is performed in the program, a
run-time error causes the program to crash.

She has decided there is not enough time to debug the code because the client needs the
system urgently, and there is a possibility that the client may never perform this sequence of
actions.

Explain the reasons why Lara is not acting ethically.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) The client wants to copyright the final program so that no one else can copy or amend it.

(i) State the purpose of copyrighting the computer program.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Identify two software licences that would be appropriate for the program.

Licence 1 ...........................................................................................................................

Licence 2 ...........................................................................................................................
[2]

(iii) Identify one software licence that would not be appropriate for the program. Justify your
choice.

Software licence ................................................................................................................

Justification .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[2]
© UCLES 2020 9608/13/O/N/20 Page 32 of 52
Page 33 of 52
Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9608 12
5 One mark per row. [4]

No mark if more than one tick in any row.

Description Open source Shareware Commercial


Software is purchased 
before it can be used
Source code comes with

the software
Software is provided free 
on a trial basis
The software can be

modified by the user

6 One mark for identifying the principle, one mark for an example that is in the context of this
scenario.

Maximum of two marks per principle. Maximum of three principles. [6]

• PUBLIC / Software engineers shall act consistently with the public interest.
o Example in context
• CLIENT AND EMPLOYER / Software engineers shall act in a manner that is in the best
interests of their client and employer (consistent with the public interest.)
o Example in context
• PRODUCT / Software engineers shall ensure that their products and related modifications
meet the highest professional standards possible.
o Example in context
• JUDGEMENT / Software engineers shall maintain integrity and independence in their
professional judgment.
o Example in context
• MANAGEMENT / Software engineering managers and leaders shall subscribe to and
promote an ethical approach to the management of software development and maintenance.
o Example in context
• PROFESSION / Software engineers shall advance the integrity and reputation of the
profession (consistent with the public interest).
o Example in context
• COLLEAGUES / Software engineers shall be fair to and supportive of their colleagues.
o Example in context
• SELF / Software engineers shall participate in lifelong learning regarding the practice of their
profession and shall promote an ethical approach to the practice of the profession.
o Example in context

Page 34 of 52
Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9608 13

3 (a) Two from: [2]

• The source code comes with the software.


• The user can edit the source code.
• Once edited, the software is re-distributed with the changes.

(b) Two from: [2]

• The software is purchased.


• With a licence which restricts the number of users / possible time period for use.
• The program code for the software cannot be edited.

(c) Four from: [4]

• Support / training is readily available so help can be accessed if needed.


• More robust software / fewer bugs as it has been tested more thoroughly/by more users.
• Forums / user groups will exist for popular software.
• Software upgrade path likely to be available (at minimal cost).
• Manufacturer develops patches that can be automatically downloaded.
• Compatibility is inbuilt for other commercial software.

Page 35 of 52
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

2(a) 1 mark for each correct term 4

• Commercial Licence
• Free Software Licence
• Shareware Licence
• Open Source Licence

2(b)(i) 1 mark per bullet point to max 3 3

• Data redundancy // data is repeated in more than one file


• Data dependency // changes to data means changes to programs
accessing that data
• Lack of data integrity // entries that should be the same can be different
in different places
• Lack of data privacy // all users have access to all data if a single flat file

2(b)(ii) 1 mark for each correct name, 1 mark for each matching description, max 2 4
marks per level

• External
• The individual’s view(s) of the database

• Conceptual
• Describes the data as seen by the applications making use of the
DBMS
• Describes the ‘views’ which users of the database might have

• Physical / Internal
• Describes how the data will be stored on the physical media

• Logical
• Describes how the relationships will be implemented in the logical
structure of the database

2(c)(i) 1-to-many // 1 customer to/has many licences 1

2(c)(ii) 1 mark per bullet point 2

• CustomerID is the Primary key in CUSTOMER table


• Links to CustomerID as a Foreign key in LICENCE table

© UCLES 2019 Page 4 of 9 Page 36 of 52


9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

3(b)(ii) 1 mark per bullet point to max 3 3

• Produces an executable file


• User does not have access to source code
• It will (probably) be faster to run the executable
• Code does not have to be compiled each time it is run
• Does not need the compiler to be present at run-time

Question Answer Marks

4(a) 1 mark for naming a principle, 1 mark for description to max 3 × 2 6

• Product
• Software engineers shall ensure that their products and related
modifications meet the highest professional standards possible.

• Judgement
• Software engineers shall maintain integrity and independence in their
professional judgement.

• Management
• Software engineering managers and leaders shall subscribe to and
promote an ethical approach to the management of software
development and maintenance.

• Profession
• Software engineers shall advance the integrity and reputation of the
profession consistent with the public interest.

• Colleagues
• Software engineers shall be fair to and supportive of their colleagues.

• Self
• Software engineers shall participate in life-long learning regarding the
practice of their profession and shall promote an ethical approach to the
practice of the profession.

4(b) 1 mark per bullet point to max 2 × 2 4

Data backup
• A copy of data will have been made and stored elsewhere.
• If the original is lost, the backup can be used to restore the data.

Disk-mirroring
• The data is stored on two disks simultaneously.
• If the first disk drive fails, the data is accessed from the second disk.

© UCLES 2019 Page 6 of 9 Page 37 of 52


9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

4(c) 1 mark per bullet to max 4 4

• DRAM has to be refreshed / charged and SRAM does not require a


refresh
• DRAM uses a single transistor and capacitor and SRAM uses more
than one transistor
• DRAM stores each bit as a charge and in SRAM each bit is stored
using a flip-flop/latch
• DRAM requires higher power consumption under low levels of access,
(which is significant when used in battery-powered devices because it
requires more circuitry for refreshing) // SRAM uses less power (no
need to refresh)
• DRAM less expensive to purchase (requires fewer transistors) // SRAM
is more expensive to buy (as it requires more transistors)
• DRAM has slower access time/speed (because it needs to be
refreshed) // SRAM has faster access times
• DRAM can have higher storage/bit/data density // SRAM has lower
storage/bit/data density
• DRAM used in main memory and SRAM used in cache memory

4(d)(i) 1 mark for correct answer 1

Formal or legal recognition of ownership of the program // Formal or legal


restriction / permissions on use of the program // The intellectual property
rights to the program

4(d)(ii) 1 mark per bullet point 2

• She does not wish to release the source code


• She does not want anyone to be able to edit / modify / share the source
code/program
• She wants to make money from the program

© UCLES 2019 Page 8 of 11 Page 38 of 52


9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

4(d)(iii) 1 mark for a name and a description of each licence to max 2 2

Commercial Software
• The program is purchased for a fee
• It restricts the number of users/possible time period for use // Limited
number of installations allowed // Software key needed to install
• Source code not provided // source code protected / cannot be edited
• Anyone can purchase/download if agree to the terms

Shareware
• The program is free for a trial period // The (free) program may have
limited functionality // Need to purchase / enter details after trial
• Users do not have access to the source code // source code may not be
edited
• Users may re-distribute the software.

Freeware
• There is no charge for the software
• The software could still be copyrighted
• She can set her own restrictions on what a user can do with the
program

Question Answer Marks

5(a)(i) 1 mark for correct answer 1

Repeated / duplicated data

5(a)(ii) 1 mark per bullet point 3

• Because each record/piece of data is stored once and is referenced by


a (primary) key
• Because data is stored in individual tables
• and the tables are linked by relationships
• By the proper use of Primary and Foreign keys
• By enforcing referential integrity
• By going through the normalisation process

5(b)(i) 1 mark per bullet point 2

• Security ensures that data is safe from unauthorised access // safe from
loss
• Integrity ensures that data is accurate / consistent / up to date

© UCLES 2019 Page 9 of 11 Page 39 of 52


9608/13 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

2(d) 1 mark per bullet point to max 3 3

For example: He should ...


• ...Keep the client’s personal data private
• ...Involve the client in the development //  Communicate with the client
• Provide the solution that the client asked for
• ...Keep the project running on time // budget
• ...Keep the client informed of any problems/delays

2(e) 1 mark per bullet point to max 3 3

• He uses a compiler because it creates a separate executable file


• The executable means the client cannot access the source code // edit
the program
• The executable means the client does not need the IDE / compiler
• It will (probably) be faster to run the executable than to interpret the
source code every time the program is run

Question Answer Marks

3(a)(i) 1 mark per bullet point 2

• Stores all the information about the database // data about the


data // metadata about the data
• For example, fields, data types, validation, keys

3(a)(ii) 1 mark per bullet point to max 2 2

• Allows the user to enter criteria


• Searches for data which meets the entered criteria
• Organises the results to be displayed to the user

3(b) 1 mark per bullet point to max 2 2

• Primary key uniquely identifies each tuple // Each tuple in the table is


unique
• Primary key can be used as a foreign key in another table
• .. to form a link/relationship between the tables

By example:
• Identification of a primary key in a table
• Describing that primary key in another table as a foreign key

© UCLES 2019 Page 5 of 10 Page 40 of 52


9608/12 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

2(c)(i) 1 mark per bullet point to max 3 3

• Disk contents analysis checks for errors/problems with the disk


• Disk repair attempts to fix the errors
• The disk formatter prepares the disk for (initial) use (again).

2(c)(ii) 1 mark per bullet point to max 3 3

• Installation of device driver software


• Managing interrupts / signals from the device
• Sending control signals to the device
• Control of buffers
• Management of queues

2(c)(iii) 1 mark for benefit, 1 mark for expansion for max 2 benefits 4

• Fast data transfer


• … useful when transferring large files such as video files

• Automatic connection / plug-and-play


• … so usually there is no need to install separate device drivers

• USB is a standard adopted by many manufacturers


• … meaning all new computers will be equipped with USB ports

• Devices may be powered or charged through USB


• … so external devices may be charged while working at the computer

Question Answer Marks

3 1 mark for each correct gate 4

X = NOT (A AND B) OR NOT (NOT B OR C)

4(a)(i) 1 mark only e.g. 1

• Read about the languages she will be using


• Visits the office prior to starting
• Speaks to her manager about concerns

© UCLES 2020 Page 4 of 9 Page 41 of 52


9608/12 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

4(a)(ii) 1 mark per action to max 2 2

For example:
• Prepare an induction
• Invite Sophie in before starting
• Introduce Sophie to the team
• Give Sophie a mentor

4(a)(iii) 1 mark only e.g. 1

• Prepare a greeting/introduction
• Provide structured support
• Invite Sophie to social event(s) before/at the start to meet people

4(b) 1 mark per bullet point to max 3 3

• Sophie is confirming that she understands the code of conduct


• To make sure Sophie knows what behaviour is expected of her
• To make sure Sophie understands there may be consequences of some
actions
• To ensure all employees adhere to the same standards

Question Answer Marks

5(a) 1 mark for one letter in the correct place, 2 marks for all three correct 2

2 B
4 A
5 C

5(b)(i) 11000010 1

5(b)(ii) CD 1

5(b)(iii) 1 mark per bullet point to max 2 2

• The maximum range for an 8-bit two's complement binary number is −128
to +127
• … 200 is outside of the maximum range

© UCLES 2020 Page 5 of 9 Page 42 of 52


9608/13 Cambridge International AS & A Level – Mark Scheme May/June 2020
PUBLISHED

Question Answer Marks

4(b) 1 mark for interpreter 3

1 mark per bullet point for justification to max 2

• The interpreter translates and executes line by line


• The interpreter stops translation when an error is found
• …the error can be corrected, and the program continues running from where it
stopped
• There is no need for an executable file (at this stage)

4(c)(i) 1 mark per benefit to max 2 2

• She can charge a fee for the game


• She retains the copyright
• ... so, the game cannot be re-distributed by a third-party without her permission

4(c)(ii) 1 mark per benefit to max 1 1

• Potentially better support, as she is charging a fee


• Likely to have fewer bugs / less prone to malware than if distributed under other
licences e.g. open source
• Redress available if the game does not function correctly

4(c)(iii) 1 mark per bullet point 2

• They can check it works // check if it meets their requirements


• ... without having to paying a fee if it does not

Question Answer Marks

5(a) 1 mark per bullet point to max 3 3

• Encryption scrambles the source code (so it is meaningless)


• … using an encryption key / algorithm
• If the file is accessed without authorisation it will be meaningless
• It requires a decryption key / algorithm to unscramble

5(b) 1 mark for a lossless technique 3


1 mark per bullet point for justification to max 2

• Lossless does not lose any data


• Any lost data will mean the program will not work

© UCLES 2020 Page 6 of 9 Page 43 of 52


Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9608 12

5 One mark for each correctly placed tick.

Activity Ethical Unethical

Gives away passwords used in the intruder detection



software

Uses source code developed at the software house



for the software he develops for his own company

Insists that staff work to deadlines 

Turns down training opportunities offered by his



employer

Writes and sells software that reads confidential data



from client computers

Fakes test results of safety-critical software 

Has the software applications developed overseas for



sale in his own country
[7]

Page 44 of 52
Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9608 13

To save time, Paul fakes the test results


when testing the bank security software.

Paul uses the software developed in his


day job to help write some of the games
software routines.

To allow him to concentrate on his


games software, Paul has frequently
turned down job opportunities in his day Ethical
job.

To make the games software more


realistic, Paul uses password protection
code used in the bank security software.

Because his work load is increasing,


Paul is now using overseas companies
to write some of the routines used in his
games software.

Unethical

Paul carries out training on how to write


games software in his spare time.

1 mark for each correct line, two lines from one box is incorrect [6]

Page 45 of 52
9608/12 October/November
Cambridge International AS/A Level – Mark Scheme
PUBLISHED 2017

Question Answer Marks

5
Public

Incident A Client & Employer

Incident B Product
Ethical

Incident C Judgement

Incident D Management
Unethical
Incident E Profession

Incident F Colleagues

Self

5(a) Mark as follows: 2


Unethical: C and E 1 Mark
Ethical: A,B, D and F 1 Mark

5(b) Mark as follows: 4


A – Public interest 1 Mark
B – Self 1 Mark
D – Profession 1 Mark
F – Product 1 Mark

Page 46 of 52
9608/13 October/November

Cambridge International AS/A Level – Mark Scheme


PUBLISHED 2017

Question Answer Marks

6(a) Two marks from: Max 2

• A system of moral principles


• That guide behaviour / decision making
• Based on philosophical / religious views
• By example, e.g. respectful and considerate behaviour

6(b) One mark for identifying the issue Max 6


One mark for correct principle
One mark for possible action
Max 2 issues (2 × 3 marks)

1 Uncomfortable with one of his colleagues


Client and Employer // Management / Colleagues // Judgement // Self
For example: Team building exercises // arranged meeting

2 Unfamiliar with programming language


Self // Client and Employer //Product // Profession // Colleagues
For example: Undergo training

3 Visit to unfamiliar workplace


Client and employer // Management // Judgement // Profession // Colleagues
For example: He should speak to his manager to discuss situation

Page 47 of 52
9608/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

4(b)(iv) 1 mark per bullet point 3

• Select FirstName and comma and LastName


• From MEMBER
• Where MembershipType = "Peak"

SELECT FirstName, LastName


FROM MEMBER
WHERE MembershipType = "Peak";

Question Answer Marks

5(a) 1 mark per bullet point to max 2 2

• Encryption
• Assign a unique code so it will not install without this // product key
• Limit the number of times that version of the software can be installed
• Set a time limit within which the software must be installed

5(b) • Provide an .exe file // Compile the source code // Use a compiler 1

5(c)(i) 1 mark per benefit to max 2 2

• So that she can sell the software for a fee // make money from the software
• A commercial licence prohibits unauthorised/further copies being made
and/or distributed
• A commercial licence prohibits any changes to the software

5(c)(ii) 1 mark per bullet point to max 2 2

• Open Source
• Free Software
• Shareware
• Freeware

© UCLES 2019 Page 7 of 10 Page 48 of 52


9608/11 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

2(e)(ii) 1 mark per correct method to max 2 2

• Usernames and Passwords


• Biometrics // fingerprint recognition // iris scanner
• Two-step verification
• Token authentication // use of dongle // swipe cards

Question Answer Marks

3(a)(i) 1 mark per bullet point to max 2 2

Product:
For example:
• Ensure product is of a high standard
• Ensure product meets requirements
• Ensure the product is delivered within time
• Ensure the product is delivered within budget
• Ensure product development is well-documented
• Ensure product is tested thoroughly // free of bugs

3(a)(ii) 1 mark per bullet point to max 2 2

Colleagues:
For example:
• Need to be fair// do not show any prejudices
• To be supportive of colleagues
• Work together as a team
• Listen to each other’s ideas
• Assist colleagues in professional development
• Fully credit the work of other members of the team
• Make colleagues aware of expected standard ways of working

3(b) 1 mark for naming licence, 1 mark for description to max 2 per licence 4

• Commercial / proprietary...
• ...Software is sold for a fee therefore giving the client the income

• Shareware...
• ...Free for a trial period / limited features, and then users must pay for it

© UCLES 2020 Page 6 of 10 Page 49 of 52


9608/12 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

6(a) 1 mark per bullet point to max 2 2

For example:
• The manager is supporting her professional development
• The manager is working in the best interest of his/her colleague (Malika)
• This will ensure she is introduced to all aspects of the job
• The manager is offering appropriate support

6(b) 1 mark per bullet point to max 2 2

For example:
• She is acting in her own best interest
• … by taking responsibility for her own professional development
• She is acting in the best interests of her colleagues
• … by ensuring she is up-to-date and does not need further training

6(c) 1 mark per bullet point to max 2 2

For example:
• Discuss the problems with her
• Discuss the concerns with her colleagues
• Assign her a mentor who can reassure her
• Team building exercises

7(a) 1 mark for correct lines from IPv4, 1 mark for correct lines from IPv6 2

Characteristic IP address
Can use hexadecimal
notation

Each group of digits is a


number between 0 and
65535 IPv4

Consists of four groups of


digits

IPv6
Uses double colons (::)

The total length of the


address is 32 bits

© UCLES 2020 Page 10 of 11 Page 50 of 52


9608/13 Cambridge International AS & A Level – Mark Scheme October/November
PUBLISHED 2020

Question Answer Marks

6(a) 1 mark for each valid point or appropriate expansion to max 2 2

e.g.
• Reduce his workload // Review his work demands
• Redistribute his work
• Arrange a meeting with him
• ... to discuss the reasons why he is struggling

6(b) 1 mark for each valid point or appropriate expansion to max 2 2

e.g.
• Not acting in best interest of the client
• ... The error could cause significant problems for the client if encountered
• The product does not meet the highest possible standard
• Not acting in the best interest of the development company
• … if the error occurs, it could lead to repercussions for the development
company

6(c)(i) 1 mark from 1

• Protects the intellectual property


• Allows legal action against anyone else who claims it as their own
• Formally / Legally identify the client as the owner of the software

6(c)(ii) 1 mark for each correct licence 2

• Commercial
• Shareware

6(c)(iii) 1 mark for correctly identifying a licence, 1 mark for justification 2

• Open Source // Free Software


• Anyone can modify/copy the source code and re-distribute which is not
what the client wants

Question Answer Marks

7(a) 1 mark per bullet point to max 4 4

• Each item is a drawing object


• Properties of each drawing object are stored
• … an example of a property e.g. the position/coordinates of each drawing
object
• … a second example of a property e.g. the line colour
• Exact dimensions are not stored // a calculation for proportional size is
stored
• Objects are created using mathematical calculations

© UCLES 2020 Page 8 of 10 Page 51 of 52

You might also like