Cambridge International Advanced Subsidiary and Advanced Level
Cambridge International Advanced Subsidiary and Advanced Level
Cambridge International Advanced Subsidiary and Advanced Level
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (RW/CT) 150986/3
© UCLES 2018 [Turn over
2
1 (a) A computer system uses floating-point representation to store real numbers. The floating-point
numbers have:
(i) Calculate the denary value of the following floating-point number. It is not in normalised
form.
Mantissa Exponent
0 0 1 0 1 0 1 0 0 0 0 0 0 1 0 1
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Answer ..............................................................................................................................
[3]
(ii) Convert the denary number + 7.5 into a normalised floating-point number.
Mantissa Exponent
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(iii) Convert the denary number − 7.5 into a normalised floating-point number.
Mantissa Exponent
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
Mantissa Exponent
0 1 1 1 1 1 1 1 0 1 1 1 1 1 1 1
...........................................................................................................................................
.......................................................................................................................................[1]
(ii) State what will happen if a positive number is added to this number.
...........................................................................................................................................
.......................................................................................................................................[1]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) The table shows statements that relate to circuit switching, packet switching or both.
Tick (✓) one or more boxes in each row to show whether the statement applies to circuit
switching, packet switching or both.
Shares bandwidth
[4]
A.B.C+A.B.C+A.B.C
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) (i) Complete the truth table for the following logic circuit.
A B C
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[2]
(ii) Complete the Karnaugh Map (K-map) for the truth table in part (b)(i).
AB
00 01 11 10
0
C
1
[1]
(iii) Draw loops around appropriate groups of 1s in the table in part (b)(ii) to produce an
optimal sum-of-products. [2]
(iv) Using your answer to part (b)(iii), write a simplified sum-of-products Boolean expression.
X = .................................................................................................................................[2]
© UCLES 2018 9608/32/O/N/18
7
(c) The truth table for a logic circuit with four inputs is shown.
INPUT OUTPUT
A B C D X
0 0 0 0 0
0 0 0 1 0
0 0 1 0 0
0 0 1 1 0
0 1 0 0 1
0 1 0 1 0
0 1 1 0 0
0 1 1 1 0
1 0 0 0 0
1 0 0 1 0
1 0 1 0 0
1 0 1 1 0
1 1 0 0 1
1 1 0 1 1
1 1 1 0 1
1 1 1 1 1
(i) Complete the K-map for the truth table in part (c).
AB
CD
[4]
(ii) Draw loops around appropriate groups of 1s in the table in part (c)(i) to produce an
optimal sum-of-products. [2]
(iii) Using your answer to part (c)(ii), write a simplified sum-of-products Boolean expression.
X = .................................................................................................................................[2]
4 A compiler uses a keyword table and a symbol table. Part of the keyword table is shown.
Keyword Token
01
+ 02
= 03
IF 4A
THEN 4B
ENDIF 4C
ELSE 4D
FOR 4E
STEP 4F
TO 50
INPUT 51
OUTPUT 52
ENDFOR 53
Entries in the symbol table are allocated tokens. These values start from 60 (hexadecimal).
INPUT Number1
INPUT Number2
INPUT Answer
IF Answer = Number1 + Number2
THEN
OUTPUT 10
ELSE
OUTPUT 0
ENDIF
(a) Complete the symbol table to show its contents after the lexical analysis stage.
Token
Symbol
Value Type
Number1 60 Variable
Number2 61 Variable
[3]
© UCLES 2018 9608/32/O/N/18
9
(b) The output from the lexical analysis stage is stored in the following table. Each cell stores one
byte of the output.
Complete the output from the lexical analysis. Use the keyword table and your answer to
part (a).
51 60
[2]
After the syntax analysis is complete, the compiler generates object code.
(i) Identify the final stage in the compilation process that follows this code generation stage.
.......................................................................................................................................[1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
(iii) State two benefits of the process that is carried out in the final stage.
Benefit 1 ............................................................................................................................
...........................................................................................................................................
Benefit 2 ............................................................................................................................
...........................................................................................................................................
[2]
(d) An interpreter is executing a program. The program uses the variables a, b, c and d.
The program contains an expression that is written in infix form. The interpreter converts the
infix expression to RPN.
Show the changing contents of the stack as the interpreter evaluates the expression.
The first entry on the stack has been done for you.
2
[4]
5 (a) Most desktop or laptop computers use CISC (Complex Instruction Set Computing)
architecture. Most smartphones and tablets use RISC (Reduced Instruction Set Computing).
State four features that are different for the CISC and RISC architectures.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
(b) In a RISC processor, four instructions (A, B, C, D) are processed using pipelining.
The following table shows five stages that take place when instructions are fetched and
executed. In time interval 1, instruction A has been fetched.
(i) In the table, write the instruction labels (A, B, C, D) in the correct time interval for each
stage. Each operation only takes one time interval.
Time interval
Stage
1 2 3 4 5 6 7 8 9
Fetch instruction A
Decode instruction
Execute instruction
Access operand in memory
Write result to register
[3]
(ii) When completed, the table in part (b)(i) shows how pipelining allows instructions to be
carried out more rapidly. Each time interval represents one clock cycle.
Calculate how many clock cycles are saved by using pipelining in the example in
part (b)(i).
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Answer ..............................................................................................................................
[3]
Put a tick (✓) in each row to identify the computer architecture associated with each statement.
Architecture
Statement
SIMD MIMD SISD
6 (a) The following table shows descriptions and terms relating to data transmission security.
Description Term
The result of encryption that is transmitted to the
A
recipient. .................................
The type of cryptography used where different keys are
B
used; one for encryption and one for decryption. .................................
.........................................................................................
.........................................................................................
C Digital certificate
.........................................................................................
.........................................................................................
.........................................................................................
.........................................................................................
D Private key
.........................................................................................
.........................................................................................
[4]
(b) The sequence of steps 1 to 7 describes what happens when setting up a secure connection
using Secure Socket Layer (SSL).
If the browser trusts the certificate, it creates, encrypts and sends the server a
A
symmetric session key using the server’s public key.
B Server sends the browser an acknowledgement, encrypted with the session key.
C Server sends a copy of its SSL Certificate and its public key.
D Server decrypts the symmetric session key using its private key.
2. ……………
4. ……………
5. ……………
6. ……………
7. Server and browser now encrypt all transmitted data with the session key.
[3]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.