Computer 1
Computer 1
Page 1 of 161
2
....................................................................................................................................................
............................................................................................................................................... [1]
............................................................................................................................................... [1]
(c) (i) Complete the following binary addition. Show your working.
10011010
+11110111
[2]
(ii) Describe the error that occurred when you added the binary numbers in part (c)(i).
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
....................................................................................................................................... [2]
01100111
–00110010
[2]
BLANK PAGE
2 Yvette runs a company that books walking holidays for groups of people. She has a website that
customers use to book the holidays.
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
............................................................................................................................................... [4]
(b) An IP address can be static or dynamic. Describe static and dynamic IP addresses.
Static ..........................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
Dynamic .....................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
[4]
(c) Yvette’s company has a LAN (Local Area Network) that has hybrid topology.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
....................................................................................................................................... [2]
(ii) The LAN has a range of different topologies. One subnetwork connects four computers
and one server set up as a star topology.
Describe how packets are transmitted between two of the computers in this subnetwork.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
....................................................................................................................................... [3]
Identify three other hardware components that might be used to set up the LAN.
1 .........................................................................................................................................
............................................................................................................................................
2 .........................................................................................................................................
............................................................................................................................................
3 .........................................................................................................................................
....................................................................................................................................... [3]
(ii) Describe how Carrier Sense Multiple Access/Collision Detection (CSMA/CD) manages
collisions during data transmission.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
....................................................................................................................................... [3]
•• data about holidays, such as the location, date, duration (in days)
•• data about the customers and the holidays they have booked.
(a) Mehrdad has normalised the database, which has three tables.
[3]
(ii) Complete the table to identify the primary key and foreign key(s) for each of the tables
you identified in part (a)(i). If the table has no foreign key(s), write ‘None’.
[3]
(iii) Explain why the holiday database is in Third Normal Form (3NF).
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
....................................................................................................................................... [2]
(b) The holiday company has several members of staff. The database has two additional tables
to store data about the staff.
The following table shows some sample data from the table SCHEDULE.
(i) Write an SQL script to display the first name and second name of all staff members
working on 22/05/2020.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
....................................................................................................................................... [4]
(ii) Write an SQL script to count the number of people working on the morning of 26/05/2020.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
....................................................................................................................................... [3]
(a) Complete the following descriptions of types of system. Write the correct missing term in the
spaces.
The factory uses a .................................................. system to record data such as the number
When the data collected from sensors are analysed and used as
of this system, used in the factory, is to maintain a constant temperature in the ovens. It uses
(b) Cake mixture is mixed in a large pot. A conveyer belt moves the cake tins beneath the pot.
The conveyer belt stops and a set quantity of the cake mixture fills the cake tin. The conveyer
belt then moves and another cake tin is positioned beneath the pot.
Explain how the control system will ensure the correct amount of mixture is placed in the cake
tins.
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
............................................................................................................................................... [5]
(c) The cake factory has servers that store its confidential recipes and control the factory
machines.
(i) Describe the implications of a hacker gaining access to the cake factory’s servers.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
....................................................................................................................................... [4]
(ii) Explain how the company could protect its data against hackers.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
....................................................................................................................................... [4]
(d) The machines have a counter to record the number of cake tins filled. Each time a cake tin is
filled, the counter is increased by 1. The value is stored in an 8-bit register, the current value
is shown.
0 0 0 0 1 0 0 1
(i) Show the value of the binary number after another five cake tins have been filled.
[1]
(ii) The following table shows some assembly language instructions for a processor which
has one general purpose register, the Accumulator (ACC).
Instruction Explanation
Op code Operand
AND #n Bitwise AND operation of the contents of ACC with the
operand
AND <address> Bitwise AND operation of the contents of ACC with the
contents of <address>
XOR #n Bitwise XOR operation of the contents of ACC with the
operand
XOR <address> Bitwise XOR operation of the contents of ACC with the
contents of <address>
OR #n Bitwise OR operation of the contents of ACC with the
operand
OR <address> Bitwise OR operation of the contents of ACC with the
contents of <address>
LSL #n Bits in ACC are shifted logically n places to the left. Zeros
are introduced on the right hand end
LSR #n Bits in ACC are shifted logically n places to the right. Zeros
are introduced on the left hand end.
............................................................................................................................................
....................................................................................................................................... [2]
(iii) A two-place logical shift to the left is performed on the binary number shown in
part (d).
[1]
(iv) State the mathematical result of a one-place logical shift to the right on a binary
number.
............................................................................................................................................
....................................................................................................................................... [1]
(e) The factory servers run software that makes use of Artificial Intelligence (AI).
Explain how the use of AI can help improve the safety and efficiency of the factory.
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
............................................................................................................................................... [3]
[4]
X = (A XOR B) OR NOT (A OR B OR C)
A B C Working space X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(i) Complete the following table to describe the two terms about graphics.
Term Description
...........................................................................................................................
Pixel ...........................................................................................................................
...........................................................................................................................
...........................................................................................................................
File header ...........................................................................................................................
...........................................................................................................................
[2]
(ii) The image is scanned with an image resolution of 1024 × 512 pixels, and a colour depth
of 8 bits per pixel.
Calculate an estimate for the file size, giving your answer in mebibytes. Show your
working.
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Identify one method of lossless compression that can be used to compress the image and
describe how the method will reduce the file size.
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2021 9618/11/M/J/21
Page 14 of 161
3
(c) One of the colours used in the image has the hexadecimal colour code:
#FC238A
FC is the amount of red, 23 is the amount of green and 8A is the amount of blue in the colour.
..................................................................................................................................... [1]
(ii) The amount of green in binary is 00100011. This has the denary number 15 added to it
to create a second colour.
Add the denary number 15 to the binary number 00100011 and give your answer in
binary.
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Subtract the denary number 10 from the two’s complement representation 00100011.
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(d) Anya made sure that the image was not subject to any copyright before scanning it.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(a) Draw one line from each utility software to its correct description.
[4]
(b) Identify four key management tasks that the Operating System will perform.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
4 ................................................................................................................................................
[4]
3 A processor has one general purpose register, the Accumulator (ACC), and several special
purpose registers.
(a) Complete the following description of the role of the registers in the fetch-execute cycle by
writing the missing registers.
(b) The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
LDD <address> Direct addressing. Load the contents of the location at the given address to ACC
Indirect addressing: The address to be used is at the given address. Load the
LDI <address>
contents of this second address to ACC
Indexed addressing. Form the address from <address> + the contents of the
LDX <address>
Index Register. Copy the contents of this calculated address to ACC
LDR #n Immediate addressing. Load the number n to IX
MOV <register> Move the contents of the accumulator to the given register (IX)
STO <address> Store contents of ACC at the given address
ADD <address> Add the contents of the given address to the ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP <address> Compare the contents of ACC with the contents of <address>
JPE <address> Following a compare instruction, jump to <address> if the compare was True
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
OUT Output to the screen the character whose ASCII value is stored in ACC
END Return control to the operating system
Bits in ACC are shifted logically n places to the left. Zeros are introduced on
LSL #n
the right hand end
Bits in ACC are shifted logically n places to the right. Zeros are introduced on
LSR #n
the left hand end
<address> can be an absolute address or a symbolic address
# denotes a denary number, e.g. #123
The current contents of the main memory and selected values from the ASCII character set
are shown.
365 1
366 3
367 65
368 66
IX 0
Complete the trace table for the program currently in main memory.
1 3 65 66 0
[6]
0 0 1 1 0 1 0 1
Write the contents of the Accumulator after the processor has executed the following
instruction:
LSL #2
[1]
0 0 1 1 0 1 0 1
Identify the mathematical operation that the following instruction will perform on the
contents of the accumulator.
LSR #3
...........................................................................................................................................
..................................................................................................................................... [1]
4 Melinda and her friends set up a peer-to-peer network between their computers to share data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Describe two drawbacks to Melinda and her friends of using a peer-to-peer network.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(c) Melinda connects her laptop to the internet through her router.
(i) Tick (3) one box in each row to identify whether the task is performed by the router or
not.
(ii) Melinda mainly uses the internet to watch films and play computer games.
Tick (3) one box to identify whether Melinda should connect to the router using a wired
or wireless network and justify your choice.
Wired
Wireless
Justification .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(d) Melinda sends emails from her webmail account (email account accessed through a website).
Explain whether Melinda is using the internet, or the World Wide Web (WWW), or both.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Describe what is meant by an embedded system, using the washing machine as an example.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) The washing machine’s embedded system makes use of both Random Access Memory
(RAM) and Read Only Memory (ROM).
State the purpose of RAM and ROM within the washing machine’s embedded system.
RAM ..........................................................................................................................................
...................................................................................................................................................
ROM .........................................................................................................................................
...................................................................................................................................................
[2]
(c) The temperature in her refrigerator must be kept between 4 and 6 degrees Celsius.
The microprocessor in the refrigerator turns on the cooling if the temperature is too high, and
turns off the cooling if the temperature is too low.
Explain why the system in the refrigerator is a control and not a monitoring system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
State the type of validation check that each of the algorithms performs.
(a)
INPUT x
OUTPUT "Invalid"
ENDIF
.................................................................................................................................................... [1]
(b)
INPUT x
IF x = "" THEN
OUTPUT "Invalid"
ENDIF
.................................................................................................................................................... [1]
(c)
INPUT x
OUTPUT "Invalid"
ENDIF
.................................................................................................................................................... [1]
(a) Bobby tells Kim that a file-based approach is usually better than a relational database.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Bobby has a shop that sells products to customers. His database will store data about his
customers, their payment details, orders and the products he sells. Customers will have login
details to access their accounts. The database will update customers’ payment and login
details without keeping any historical records.
(i) Give one example of each of the following relationships from Bobby’s database.
one-to-one
...........................................................................................................................................
...........................................................................................................................................
one-to-many
...........................................................................................................................................
...........................................................................................................................................
many-to-many
...........................................................................................................................................
...........................................................................................................................................
[3]
(ii) Tick (3) one box to identify the relationship that cannot be directly implemented in a
normalised relational database.
one-to-one
one-to-many
many-to-many
[1]
© UCLES 2021 9618/11/M/J/21 [Turn over
Page 27 of 161
16
Write a Data Definition Language (DDL) statement to define a new database with the
name SHOPORDERS.
...........................................................................................................................................
..................................................................................................................................... [1]
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
8 Tick (3) one box in each row to identify the logic gate that each statement describes.
[3]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
1 Raj owns houses that other people rent from him. He has a database that stores details about
the people who rent houses, and the houses they rent. The database, HOUSE_RENTALS, has the
following structure:
(a) Give the definition of the following database terms, using an example from the database
HOUSE_RENTALS for each definition.
..............................................................................................................................
Field
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
Entity
..............................................................................................................................
..............................................................................................................................
..............................................................................................................................
Foreign key
..............................................................................................................................
..............................................................................................................................
[6]
(b) Tick (3) one box to identify whether the database HOUSE_RENTALS is in Third Normal Form
(3NF) or not in 3NF.
Justify your choice using one or more examples from the database HOUSE_RENTALS.
In 3NF
Not in 3NF
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(i) Complete the following Data Definition Language (DDL) statement to define the table
RENTAL.
.......................................................... (RentalID)
);
[4]
(ii) Write a Data Manipulation Language (DML) script to return the first name and last name
of all customers who have not paid their deposit.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(a) Explain the reasons why it is important that Aisha acts ethically in relation to her team
members.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) The team are developing a computer game where the user plays a board game (such as
chess) against the computer.
Describe how the computer would use Artificial Intelligence (AI) to play the board game.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Tick (3) one or more boxes in each row to identify the licence(s) each statement describes.
Free Open
Commercial
Statement Software Source Shareware
Software
Foundation Initiative
[4]
B S
[4]
A B C Working space S
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[2]
4 The table shows part of the instruction set for a processor. The processor has one general purpose
register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
Direct addressing. Load the contents of the location at the given address to
LDD <address>
ACC
STO <address> Store contents of ACC at the given address
ADD <address> Add the contents of the given address to the ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
DEC <register> Subtract 1 from the contents of the register (ACC or IX)
CMP <address> Compare the contents of ACC with the contents of <address>
JPE <address> Following a compare instruction, jump to <address> if the compare was True
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
IN Key in a character and store its ASCII value in ACC
OUT Output to the screen the character whose ASCII value is stored in ACC
END Return control to the operating system
# denotes a denary number, e.g. #123
The current contents of the main memory and selected values from the ASCII character set are:
100 68
101 65
102 100
(a) Complete the trace table for the program currently in main memory when the following
characters are input:
A D
Do not trace the program any further when the third input is required.
[4]
Instruction
Explanation
Opcode Operand
AND #n Bitwise AND operation of the contents of ACC with the operand
AND <address> Bitwise AND operation of the contents of ACC with the contents of <address>
XOR #n Bitwise XOR operation of the contents of ACC with the operand
XOR <address> Bitwise XOR operation of the contents of ACC with the contents of <address>
OR #n Bitwise OR operation of the contents of ACC with the operand
OR <address> Bitwise OR operation of the contents of ACC with the contents of <address>
<address> can be an absolute address or a symbolic address
# denotes a denary number, e.g. #123
Bit Number 7 6 5 4 3 2 1 0
300 0 1 1 0 0 1 1 0
(i) The contents of memory address 300 represent an unsigned binary integer.
Write the denary value of the unsigned binary integer in memory address 300.
..................................................................................................................................... [1]
(ii) An assembly language program needs to test if bit number 2 in memory address 300
is a 1.
......................... #4
[1]
(iii) An assembly language program needs to set bit numbers 4, 5, 6 and 7 to 0, but keep
bits 0 to 3 with their existing values.
...........................................................................................................................................
..................................................................................................................................... [2]
(a) Complete the following descriptions of internal components of a computer by writing the
missing terms.
or read from.
logical comparisons.
[5]
(b) Describe the ways in which the following factors can affect the performance of his laptop
computer.
Number of cores
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Clock speed
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(c) Seth accesses both software and data using cloud computing.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(d) Draw one line from each term to its most appropriate description.
Term Description
Public IP address
It increments by 1 each time the device
connects to the internet
[4]
(a) State the number of characters that can be represented by the ASCII character set and the
extended ASCII character set.
ASCII ...........................................................
(b) Explain how a word such as ‘HOUSE’ is represented by the ASCII character set.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
The Unicode value for the character ‘1’ is denary value 49.
(i) Write the hexadecimal value for the Unicode character ‘1’.
..................................................................................................................................... [1]
(ii) Write the denary value for the Unicode character ‘5’.
..................................................................................................................................... [1]
(a) Jennifer uses a program library to help her write her computer program.
Describe how a program library can be used while writing a computer program.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Jennifer uses an Integrated Development Environment (IDE) to write her computer program.
(i) The IDE allows Jennifer to use both an interpreter and a compiler while creating her
computer program.
Describe the ways in which Jennifer can use both a compiler and an interpreter while
developing the program.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) Identify two debugging tools that a typical IDE can provide.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
8 A company has several security measures in place to prevent unauthorised access to the data on
its computers.
(a) Describe the difference between the security and privacy of data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Each employee has a username and password to allow them to log onto a computer. An
employee’s access rights to the data on the computers is set to either read-only, or read and
write.
Identify one other software-based measure that could be used to restrict the access to the
data on the computers.
...................................................................................................................................................
............................................................................................................................................. [1]
(c) The company is also concerned about threats posed by networks and the internet.
Identify two threats to the data that are posed by networks and the internet.
Threat 1 ....................................................................................................................................
...................................................................................................................................................
Threat 2 ....................................................................................................................................
...................................................................................................................................................
[2]
...................................................................................................................................................
............................................................................................................................................. [1]
(b) Convert the signed denary value –100 into an 8-bit two’s complement binary integer.
Working .....................................................................................................................................
...................................................................................................................................................
(c) Convert the denary number 251 into hexadecimal. Show your working.
Working .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Answer ............................................................................
[2]
01010000
+00111110
[1]
Random Access Memory (RAM) and Read Only Memory (ROM) are both examples of
......................................................................... memory.
(ii) Explain the difference between Programmable ROM (PROM), Erasable Programmable
ROM (EPROM) and Electrically Erasable Programmable ROM (EEPROM).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
(i) Complete the table by writing one set of values (input 1 and input 2) for each gate that
will give the output 1.
AND 1
NAND 1
XOR 1
NOR 1
[4]
(ii) Write the logic expression for the given logic circuit.
A
B
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
3 A teacher is writing examination papers on a laptop computer. The computer is connected to the
internet. The teacher is concerned about the security and privacy of the papers.
(a) State the difference between the security of data and the privacy of data.
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [1]
(b) Identify and describe two threats to the data. Identify one security measure to protect against
each threat. Each security measure must be different.
Threat 1 ....................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
Threat 2 ....................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
4 A teacher uses a relational database, MARKS, to store data about students and their test marks.
(a) Describe the advantages of using a relational database compared to a file-based approach.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Give the highest level of Normal Form (NF) the database MARKS is in and justify your choice.
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
12 A1 50
12 P10 100
13 A1 75
14 P10 60
Write a Structured Query Language (SQL) script to create the table STUDENT_TEST.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
(ii) Write a Structured Query Language (SQL) script to find the average mark of students in
test A7.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(d) The mark a student is awarded in a test will be entered into the database. This mark needs to
be a whole number between 0 and the maximum number of marks for that test (inclusive).
Explain how data validation and data verification can be used when a mark is entered.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(a) Draw one line from each IDE feature to its correct description.
(b) The programmer wants to allow users to edit, improve and redistribute the program.
Identify two different types of software licence that the programmer could use.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
6 (a) A computer system is designed using the basic Von Neumann model.
(i) Describe the role of the registers in the Fetch-Execute (F-E) cycle.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
(ii) Describe when interrupts are detected in the F-E cycle and how the interrupts are
handled.
Detected ............................................................................................................................
...........................................................................................................................................
Handled .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[5]
(b) Identify one factor that can affect the performance of the computer system and state how it
impacts the performance.
Factor .......................................................................................................................................
Impact .......................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(c) The table shows part of the instruction set for a processor. The processor has one general
purpose register, the Accumulator (ACC).
Instruction
Explanation
Opcode Operand
AND #n Bitwise AND operation of the contents of ACC with the operand
XOR #n Bitwise XOR operation of the contents of ACC with the operand
OR #n Bitwise OR operation of the contents of ACC with the operand
LSL #n Bits in ACC are shifted logically n places to the left. Zeros are
introduced on the right hand end
LSR #n Bits in ACC are shifted logically n places to the right. Zeros are
introduced on the left hand end
# denotes a denary number, e.g. #123
(i) Complete the register to show the result after the instruction AND #2 is executed.
Register before: 0 1 1 0 1 1 0 1
Register after:
[1]
(ii) Complete the register to show the result after the instruction OR #8 is executed.
Register before: 0 1 1 0 1 1 0 1
Register after:
[1]
(iii) Complete the register to show the result after the operation LSL #4 is executed.
Register before: 0 1 1 0 1 1 0 1
Register after:
[1]
1 (a) Draw one line from each image representation term to its correct definition.
Term Definition
[3]
(b) The following section of a bitmap image is 10 pixels wide and 5 pixels high. In this example,
each colour is represented by a letter, e.g. B is blue.
B B B B B B B B B B
Y Y P Y Y Y P Y Y Y
R R M R P K T T R R
B O P Y Y Y P G P P
R O R P P P R R R R
(i) Identify the smallest number of bits that can be used to represent each colour in the
complete bitmap image.
..................................................................................................................................... [1]
(ii) Calculate an estimate for the file size of the section of the bitmap image shown, giving
your answer in bytes. Use your answer from part (b)(i).
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(c) Describe how changing the colour depth of an image affects its file size.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(d) The first row of pixels in the image from part (b) is shown:
B B B B B B B B B B
Explain how this row of pixels can be compressed using lossless compression.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(a) One feature is a lane detection system. This system monitors the lines on either side of the
lane. If the car gets too close to one line, the system automatically moves the car away from
the line.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
• record the number of miles travelled in the current journey, from when the engine is
turned on to when it is turned off
• record the total number of miles the car has travelled since it was built.
Identify the data that will be stored in the primary and secondary storage of the car for these
two features.
Primary .....................................................................................................................................
...................................................................................................................................................
Secondary ................................................................................................................................
...................................................................................................................................................
[2]
(c) The car has a resistive touchscreen for the user to select options.
Tick (3) one box in each row to show whether each statement about a resistive touchscreen
is true or false.
3 The table shows part of the instruction set for a processor. The processor has one general purpose
register, the Accumulator (ACC).
Instruction
Explanation
Opcode Operand
AND #n Bitwise AND operation of the contents of ACC with the operand
Bitwise AND operation of the contents of ACC with the contents
AND <address>
of <address>
XOR #n Bitwise XOR operation of the contents of ACC with the operand
Bitwise XOR operation of the contents of ACC with the contents
XOR <address>
of <address>
OR #n Bitwise OR operation of the contents of ACC with the operand
Bitwise OR operation of the contents of ACC with the contents of
OR <address>
<address>
<address> can be an absolute or a symbolic address
# denotes a denary number, e.g. #123
(a) The ACC currently contains the following positive binary integer:
0 1 1 0 0 1 0 1
Write the bit manipulation instruction that would change the binary integer in ACC to:
1 1 1 1 1 1 1 1
(b) The ACC currently contains the following positive binary integer:
0 1 1 0 0 1 0 1
Write the bit manipulation instruction that would change the binary integer in ACC to:
1 0 0 1 1 0 1 0
01111110
............................................................................................................................................. [1]
(d) A three-place logical shift to the left is performed on the following positive binary integer.
01111110
............................................................................................................................................. [1]
(e) Convert the denary numbers 127 and 12 to 8-bit binary and then perform the subtraction
12 − 127 in binary.
12 in binary ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
4 A school stores personal data about its staff and students on its computer system.
(a) Explain why the school needs to keep both its data and its computer system secure from
unauthorised access.
Data ..........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(b) Complete the table by identifying two security threats to the data on a computer.
Prevention
Threat Description
method
..................................................................................
.......................... .................................................................................. ..........................
..................................................................................
..................................................................................
.......................... .................................................................................. ..........................
..................................................................................
[6]
(c) Data is encrypted when it is transmitted within the school network, or externally such as over
the internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
ACTOR FILM_FACT
FILM_ACTOR
[2]
(b) A composite primary key consists of two or more attributes that together form the primary key.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) Complete the SQL script to return the IDs of all the actors in the film with the title Cinderella.
SELECT .......................................................................................
FROM FILM_ACTOR
ON FILM_FACT.FilmID = ..............................................................................
(d) Write an SQL script to count the number of films that were released in January 2022.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(e) A Database Management System (DBMS) is used to create and manipulate the database.
Complete the descriptions of the features and tools found in a DBMS using the given terms.
Not all terms will be used.
structure
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) Explain how a programmer can make use of a typical Integrated Development Environment
(IDE) when writing and testing a program.
Writing .......................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Testing ......................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[2]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [3]
9 (a) The following incomplete table contains four network devices and their descriptions.
Complete the table by writing the missing devices and missing descriptions.
Device Description
.................................................................................................................
Wireless
Network
.................................................................................................................
Interface Card
(WNIC)
.................................................................................................................
.................................................................................................................
Wireless Access
.................................................................................................................
Point (WAP)
.................................................................................................................
[4]
(b) Describe three differences between fibre-optic cables and copper cables.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
Describe CSMA/CD.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Identify two character sets and state one difference between them.
Difference ..........................................................................................................................
...........................................................................................................................................
[3]
(iii) Describe how lossless compression can be used to reduce the file size of a text file.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(iv) Explain why lossy compression should not be used on a text file.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
© UCLES 2022 9618/13/M/J/22
Page 69 of 161
3
Statement Answer
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Step Description
......................................................................................................
PC [PC] + 1
......................................................................................................
......................................................................................................
......................................................................................................
MDR [[MAR]]
......................................................................................................
......................................................................................................
......................................................................................................
MAR [PC]
......................................................................................................
......................................................................................................
[3]
(b) Explain how interrupts are handled during the F-E cycle.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
BLANK PAGE
3 (a) The table shows part of the instruction set for a processor. The processor has one general
purpose register, the Accumulator (ACC).
Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
Direct addressing. Load the contents of the location at the
LDD <address>
given address to ACC
Indirect addressing. The address to be used is at the given
LDI <address>
address. Load the contents of this second address to ACC
<address> can be an absolute or symbolic address
# denotes a denary number, e.g. #123
Address
100 101
101 67
102 104
103 100
104 68
Complete the table by writing the value stored in the accumulator after the execution of each
instruction.
Instruction Accumulator
LDM #103
LDD 102
LDI 103
[3]
(b) The instructions in part (a) are examples of the data movement group.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(c) The table shows part of the instruction set for a processor. The processor has one general
purpose register, the Accumulator (ACC).
Instruction
Explanation
Opcode Operand
AND Bn Bitwise AND operation of the contents of ACC with the operand
XOR Bn Bitwise XOR operation of the contents of ACC with the operand
OR Bn Bitwise OR operation of the contents of ACC with the operand
B denotes a binary number, e.g. B01001010
Each instruction in the diagram is performed on the data in memory address 200.
Instruction Result
01111101
XOR B11110000
00111101
OR B01010101 11111111
11001101
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
..................................................................................................................................... [1]
5 A company wants to store data about its employees in a computer system. The owner of the
company wants to ensure the security and integrity of the data.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) One way the data stored in a computer can be kept secure is by using back-up software.
Give two other ways the data stored in a computer can be kept secure.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(b) The data about the employees is currently stored on paper. The data needs to be transferred
into the computer system.
Data validation and verification are used to help maintain the integrity of the data.
(i) Identify and describe one method of data verification that can be used when transferring
the data from paper to the computer.
Method ..............................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(ii) The company needs to transfer the date of birth of each employee into the computer
system.
Give one example of how each of the following data validation rules can be used to
validate the date of birth when it is entered into the system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
© UCLES 2022 9618/13/M/J/22
Page 77 of 161
11
(iii) Explain why the data in the system may not be correct even after validating and verifying
the data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
6 A relational database, TECHNOLOGY, stores data about the staff in a company and the computer
devices used by the staff.
(a) Describe the relationship between the two tables. Refer to the primary and foreign keys in
your answer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) The database uses a Data Definition Language (DDL) and Data Manipulation Language
(DML).
(i) Complete the SQL script to return the number of devices stored in the database for the
staff member with the first name ‘Ali’ and last name ‘Khan’.
FROM ..............................................................
(ii) The table DEVICE needs a new attribute to store whether the device has been returned
by the staff member, or not.
Write a Structured Query Language (SQL) script to insert the new attribute into the table
DEVICE.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...............................................................................................
...............................................................................................
First Normal Form (1NF)
...............................................................................................
...............................................................................................
...............................................................................................
...............................................................................................
Second Normal Form (2NF)
...............................................................................................
...............................................................................................
...............................................................................................
...............................................................................................
Third Normal Form (3NF)
...............................................................................................
...............................................................................................
[3]
7 (a) Write the logic expression for the following logic circuit.
B
X
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Complete the truth table for the following logic expression:
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[2]
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
[2]
(c) Give two benefits and one drawback of using cloud computing.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
Drawback ..................................................................................................................................
...................................................................................................................................................
[3]
1 (a) Draw one line from each binary value to its equivalent (same) value on the right.
Binary value
1 kibibyte
8 bits
1 gigabyte
8000 bits
1 byte
1000 kilobytes
1 kilobyte
1024 mebibytes
1 gibibyte
8192 bits
1 megabyte
1 mebibyte
[5]
(b) (i) Perform the following binary addition. Show your working.
10101010
+ 00110111
[2]
(ii) State how an overflow can occur when adding two binary integers.
...........................................................................................................................................
..................................................................................................................................... [1]
...................................................................................................................................................
............................................................................................................................................. [1]
2 Xanthe wants to maintain the integrity and security of data stored on her computer.
(a) Explain the difference between data security and data integrity.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Xanthe uses both data validation and data verification when entering data on her computer.
(i) Describe how data validation helps to protect the integrity of the data. Give an example
in your answer.
Description ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Example ............................................................................................................................
[2]
(ii) Describe how data verification helps to protect the integrity of the data. Give an example
in your answer.
Description ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Example ............................................................................................................................
[2]
Give two similarities and one difference between spyware and a virus.
Similarity 1 ................................................................................................................................
...................................................................................................................................................
Similarity 2 ................................................................................................................................
...................................................................................................................................................
Difference .................................................................................................................................
...................................................................................................................................................
[3]
A
B X
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Complete the truth table for the given logic circuit.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[2]
(c) Identify one logic gate not used in the given logic circuit. Draw the symbol for the logic gate
and complete its truth table.
Symbol:
Truth table:
A B Output
0 0
0 1
1 0
1 1
[3]
4 Francis is starting his first job as a software developer for a multinational company.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Francis is shown the software he will be working on. He is unfamiliar with the Integrated
Development Environment (IDE) he is required to use.
(i) Describe the ways in which Francis can act ethically in this situation.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) A typical IDE provides debugging tools to support the testing of a program.
Identify three other tools or features found in a typical IDE to support the writing of the
program.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(c) Francis is part of a team writing a program. He finds an error in part of the program that
has already been tested. He decides not to tell anyone because he is worried about the
consequences.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
© UCLES 2021 9618/11/O/N/21
Page 87 of 161
7
complete. They translate all the code at the same time and then run the program.
They produce ............................................... files that can be run without the source code.
and then run that line of code. They are most useful while developing the programs because
errors can be corrected and then the program continues from that line.
5 Javier owns many shops that sell cars. He employs several managers who are each in charge of
one or more shops. He uses the relational database CARS to store the data about his business.
(a) Tick () one box in each row to identify whether each field is a primary key or a foreign key.
MANAGER ManagerID
SHOP ManagerID
CAR RegistrationNumber
CAR ShopID
[2]
(b) Describe the ways in which access rights can be used to protect the data in Javier’s database
from unauthorised access.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) Javier uses Data Definition Language (DDL) and Data Manipulation Language (DML)
statements in his database.
(i) Complete the following DML statements to return the number of cars for sale in each
shop.
SELECT COUNT(.........................................................)
FROM .........................................................
......................................................... ShopID
[3]
(ii) Complete the DML statement to include the following car in the table CAR.
Field Data
RegistrationNumber 123AA
Make Tiger
Model Lioness
NumberOfMiles 10500
ShopID 12BSTREET
............................ ("123AA","Tiger","Lioness",10500,"12BSTREET")
[2]
BLANK PAGE
6 (a) There are two errors in the following register transfer notation for the fetch‑execute cycle.
1 MAR [PC]
2 PC [PC] − 1
3 MDR [MAR]
4 CIR [MDR]
Line
Description of the error Correct statement
number
[4]
(b) The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
LDD <address> Direct addressing. Load the contents of the location at the given address to
ACC
STO <address> Store the contents of ACC at the given address
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP <address> Compare the contents of ACC with the contents of <address>
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
IN Key in a character and store its ASCII value in ACC
OUT Output to the screen the character whose ASCII value is stored in ACC
END Return control to the operating system
XOR #n Bitwise XOR operation of the contents of ACC with the operand
XOR <address> Bitwise XOR operation of the contents of ACC with the contents of <address>
AND #n Bitwise AND operation of the contents of ACC with the operand
AND <address> Bitwise AND operation of the contents of ACC with the contents of <address>
OR #n Bitwise OR operation of the contents of ACC with the operand
OR <address> Bitwise OR operation of the contents of ACC with the contents of <address>
LSL #n Bits in ACC are shifted logically n places to the left. Zeros are introduced on
the right hand end
LSR #n Bits in ACC are shifted logically n places to the right. Zeros are introduced on
the left hand end
<address> can be an absolute or symbolic address
# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001101
Address Data
100 00001111
101 11110000
102 01010101
103 11111111
104 00000000
Each row of the following table shows the current contents of ACC in binary and the instruction
that will be performed on those contents.
Complete the table by writing the new contents of the ACC after the execution of each
instruction.
11111111 OR 101
10101010 LSR #2
[4]
(a) He repeats the recording of the sound several times, with a different sample rate each time.
(i) Describe the reasons why the sound is closer to the original when a higher sample rate
is used.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Describe the reasons why the sound file size increases when a higher sample rate is
used.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(b) Bobby wants to email the sound file to his school email address. He compresses the file
before sending the email.
(i) Explain the reasons why Bobby compresses the sound file.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(a) State whether the network will be a LAN (local area network) or a WAN (wide area network).
Justify your choice.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) One classroom in the building has 30 computers. The computers need to be connected to the
network. Each computer has a network interface card (NIC).
Identify two possible devices that can be used to physically connect the 30 computers to the
rest of the network.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(c) The school has several laptops. Each laptop has a Wireless Network Interface Card (WNIC).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
1 When designing computer systems, it is important to consider the security, integrity and privacy of
the data.
Draw one line from each measure to indicate whether it keeps data secure or protects the integrity
of data.
Measure
Firewall
Double entry
Data Security
Presence check
Data Integrity
Access rights
Password
[2]
2 (a) Complete the truth table for each of the following two logic gates.
A B Output
A 0 0
B 0 1
1 0
1 1
A B Output
A 0 0
B 0 1
1 0
1 1
[2]
X
B
[2]
(a) Andy uses several input devices to play the games. These include a keyboard and a
microphone.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Andy plays some of the computer games over the internet. He has several devices that
connect wirelessly to the router in his house.
(i) Identify the topology of Andy’s home network. Justify your choice.
Topology ............................................................................................................................
Justification .......................................................................................................................
...........................................................................................................................................
[2]
(ii) The router has a wireless access point (WAP) to allow the devices to connect wirelessly.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
BLANK PAGE
1 1 0 0 1 1 0 1
(a) The binary value in the register represents an unsigned binary integer.
............................................................................................................................................. [1]
(b) The binary value in the register represents a two’s complement binary integer.
............................................................................................................................................. [1]
............................................................................................................................................. [1]
(d) State why the value in the register cannot be interpreted as a Binary Coded Decimal (BCD).
...................................................................................................................................................
............................................................................................................................................. [1]
Register 1 0 0 1 1 1 1 0 1
Register 2 0 0 1 0 1 1 0 1
(i) Add the contents of Register 1 and Register 2. Show your working.
Answer ..............................................................................................................................
[2]
(ii) Subtract the contents of Register 2 from the contents of Register 1. Show your working.
Answer ..............................................................................................................................
[2]
(a) Complete the table by writing a description of each vector graphic term and give an example
for this logo.
Property
Drawing list
[4]
(b) Riya takes a photograph using a digital camera. The photograph is stored as a bitmap image.
(i) Describe two differences between a vector graphic and a bitmap image.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
© UCLES 2021 9618/12/O/N/21
Page 103 of 161
9
(ii) Riya needs to email the photograph. She compresses the photograph before sending it
using an email.
Describe two lossy methods that Riya can use to compress the image.
Method 1 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Method 2 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
6 A shop sells plants to customers. The shop manager has a relational database to keep track of the
sales.
PURCHASE(PurchaseID, CustomerID)
• The first stage is from a database that is not normalised (0NF) to First Normal Form
(1NF).
• The second stage is from 1NF to Second Normal Form (2NF).
• The third stage is from 2NF to Third Normal Form (3NF).
Tick () one box in each row to identify the appropriate stage for each task.
Normalisation stage
Task
0NF to 1NF 1NF to 2NF 2NF to 3NF
[2]
PLANT CUSTOMER
PURCHASE_ITEM PURCHASE
[3]
© UCLES 2021 9618/12/O/N/21
Page 105 of 161
11
Describe the purpose and contents of the data dictionary in the DBMS.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) The shop manager uses both Data Definition Language (DDL) and Data Manipulation
Language (DML) statements to create and search the database.
(i) Complete the DML statements to return the total number of items purchased with the
purchase ID of 3011A.
SELECT SUM(..................................................)
FROM ..................................................
(ii) Write DDL statements to include a field in the table PURCHASE to store the date of the
order.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
Tick () one box in each row to identify whether each event is an example of a hardware
interrupt or a software interrupt.
(b) Describe the file management tasks that an Operating System performs.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(c) Identify two utility programs that can be used to improve the performance of a computer and
state how they improve the performance.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2021 9618/12/O/N/21
Page 107 of 161
13
(a) Describe the role of the following special purpose registers in the fetch-execute (F-E) cycle.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
Identify one other special purpose register used in the Von Neumann model for a
computer system.
...........................................................................................................................................
..................................................................................................................................... [1]
(b) The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
LDD <address> Direct addressing. Load the contents of the location at the given address to
ACC
STO <address> Store the contents of ACC at the given address
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP <address> Compare the contents of ACC with the contents of <address>
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
IN Key in a character and store its ASCII value in ACC
OUT Output to the screen the character whose ASCII value is stored in ACC
END Return control to the operating system
XOR #n Bitwise XOR operation of the contents of ACC with the operand
XOR <address> Bitwise XOR operation of the contents of ACC with the contents of <address>
OR #n Bitwise OR operation of the contents of ACC with the operand
OR <address> Bitwise OR operation of the contents of ACC with the contents of <address>
AND #n Bitwise AND operation of the contents of ACC with the operand
AND <address> Bitwise AND operation of the contents of ACC with the contents of <address>
LSL #n Bits in ACC are shifted logically n places to the left. Zeros are introduced on
the right hand end
LSR #n Bits in ACC are shifted logically n places to the right. Zeros are introduced on
the left hand end
<address> can be an absolute or symbolic address
# denotes a denary number, e.g. #123
Address Data
100 01010101
101 11110000
102 00001111
103 00000000
104 11111111
(i) In the following table, each row shows the current contents of the ACC in binary and the
instruction that will be performed on those contents.
Complete the table by writing the new contents of the ACC after the execution of each
instruction.
00001111 LSL #4
11111111 OR 102
[4]
(ii) The following table contains five assembly language instruction groups.
Write an appropriate assembly language instruction for each instruction group, using the
given instruction set. The first one has been completed for you.
Arithmetic operations
Compare instructions
[4]
(iii) The opcode LDM uses immediate addressing. The opcode LDD uses direct addressing.
Description ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
00100111
00100111
(iii) Convert the 8-bit two’s complement binary integer into denary.
11100111
1 0 1 1 0 0 1 1
_ 0 1 1 1 0 1 0 1
[2]
(c) Give one similarity and two differences between the ASCII and Unicode character sets.
Similarity ...................................................................................................................................
...................................................................................................................................................
Difference 1 ..............................................................................................................................
...................................................................................................................................................
Difference 2 ..............................................................................................................................
...................................................................................................................................................
[3]
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Explain the effect of increasing the sampling resolution on the sound file.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
2 Draw one line from each security feature to its most appropriate description.
converts data to an
alternative form
firewall
pharming
anti-virus software
encryption
[4]
B X
[2]
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[2]
4 A photographer creates a relational database to store data about photographs taken at birthday
parties.
The database, PHOTOGRAPHS, stores details of the customer, the party, the photographs taken
and the cameras used.
The photographer has several cameras that are used for taking the photographs at the parties.
Each camera has a specific lens type (for example, XY32Z) and lighting type (for example, F1672).
Data about each photograph is stored in the database including the party at which it was taken,
the time it was taken and the camera used.
(a) Complete the entity-relationship (E-R) diagram for the database PHOTOGRAPHS.
PARTY CUSTOMER
PHOTO_DATA CAMERA_DATA
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) The table shows some sample data for the table PHOTO_DATA.
(i) State what is meant by a tuple. Give an example of a tuple from PHOTO_DATA.
Tuple .................................................................................................................................
...........................................................................................................................................
Example ............................................................................................................................
...........................................................................................................................................
[2]
(ii) Complete the Structured Query Language (SQL) script to display the total number of
photographs that have been taken using a camera with a camera ID starting with CAN.
FROM .........................................................................................
(d) Write an SQL script to include two new fields in CAMERA_DATA to store the number of
photographs currently on the camera and the date the camera was last used.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
5 (a) State what is meant by the stored program concept in the Von Neumann model of a
computer system.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) A Central Processing Unit (CPU) contains several special purpose registers and other
components.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(ii) Tick () one box in each row to identify the system bus used by each CPU component.
System clock
[1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
6 The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
LDD <address> Direct addressing. Load the contents of the location at the given
address to ACC
LDX <address> Indexed addressing. Form the address from <address> + the
contents of the index register. Copy the contents of this calculated
address to ACC
LDR #n Immediate addressing. Load the number n to IX
STO <address> Store contents of ACC at the given address
ADD <address> Add the contents of the given address to the ACC
ADD #n Add the denary number n to the ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP #n Compare the contents of ACC with number n
JPE <address> Following a compare instruction, jump to <address> if the
compare was True
JPN <address> Following a compare instruction, jump to <address> if the
compare was False
OUT Output to the screen the character whose ASCII value is stored in
ACC
END Return control to the operating system
<address> can be an absolute or a symbolic address
# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001101
(a) The current contents of main memory and selected values from the ASCII character set are
given.
(i) Trace the program currently in memory using the trace table.
ASCII
Character
value
49 1
50 2
51 3
52 4
65 A
66 B
67 C
68 D
[4]
© UCLES 2022 9618/11/O/N/22 [Turn over
Page 123 of 161
14
Instruction
Explanation
Opcode Operand
LDD <address> Direct addressing. Load the contents of the location at the given
address to ACC
STO <address> Store contents of ACC at the given address
LDD 100
STO 165
LDD 101
STO 100
LDD 165
STO 101
...........................................................................................................................................
...........................................................................................................................................
[1]
(b) The following table shows another part of the instruction set for the processor.
Instruction
Explanation
Opcode Operand
AND #n Bitwise AND operation of the contents of ACC with the operand
AND Bn Bitwise AND operation of the contents of ACC with the binary number n
XOR #n Bitwise XOR operation of the contents of ACC with the operand
XOR Bn Bitwise XOR operation of the contents of ACC with the binary number n
OR #n Bitwise OR operation of the contents of ACC with the operand
OR Bn Bitwise OR operation of the contents of ACC with the binary number n
LSR #n Bits in ACC are shifted logically n places to the right. Zeros are
introduced on the left-hand end
<address> can be an absolute or a symbolic address
# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001101
1 0 0 1 0 0 1 1
XOR B00011111
...........................................................................................................................................
...........................................................................................................................................
[1]
1 0 0 1 0 0 1 1
AND B11110000
...........................................................................................................................................
...........................................................................................................................................
[1]
© UCLES 2022 9618/11/O/N/22
Page 126 of 161
17
1 0 0 1 0 0 1 1
OR B11001100
...........................................................................................................................................
...........................................................................................................................................
[1]
(iv) The current contents of the ACC are:
1 0 0 1 0 0 1 1
LSR #2
...........................................................................................................................................
...........................................................................................................................................
[1]
(c) Tick (3) one or more boxes in each row to indicate whether the task is performed in the first
pass or the second pass of a two-pass assembler.
Remove comments.
[2]
7 (a) State two benefits to a programmer of using Dynamic Link Library (DLL) files.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Memory management is one of the tasks performed by an Operating System (OS).
Describe the ways in which memory management organises and allocates Random Access
Memory (RAM).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) An Operating System may include a utility program to compress text files.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(d) Explain the reasons why increasing the amount of cache memory can improve the
performance of a CPU.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(e) State the name of a peripheral device port that provides a physical connection in the computer
for each of these peripherals.
3D printer ..................................................................................................................................
Monitor ......................................................................................................................................
[2]
© UCLES 2022 9618/11/O/N/22
Page 128 of 161
19
Describe how Carrier Sense Multiple Access / Collision Detection (CSMA / CD) is used in a bus
network.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
1 (a) Draw one line from each utility software to its most appropriate purpose.
to reorganise files so
they are contiguous
virus checker
to scan for malicious
program code
disk formatter
backup
to initialise a disk
disk repair
to create copies of files
in case the original is lost
defragmentation
to check for and fix
inconsistencies on a disk
[5]
(b) Compilers and interpreters translate programs written in a high-level language into a low-level
language.
(i) State two drawbacks of using a compiler compared to an interpreter during program
development.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(ii) Explain why high-level language programs might be partially compiled and partially interpreted.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
© UCLES 2022 9618/12/O/N/22
Page 130 of 161
3
2 (a) (i) Convert the two’s complement binary integer into denary.
10010110
10010110
(iii) Convert the unsigned binary integer into Binary Coded Decimal (BCD). Show your
working.
10010101
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Answer .......................................................
[2]
1 0 0 0 1 1 0 0
+ 0 1 0 0 0 1 1 0
[1]
1 Too high
T Temperature
0 Acceptable
1 Too high
W Wind speed
0 Acceptable
1 Detected
R Rain
0 Not detected
1 On
M Manual override
0 Off
[3]
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[2]
(c) Embedded systems contain Read Only Memory (ROM) and Random Access Memory (RAM).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
4 (a) State the difference between data verification and data validation.
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Describe two other validation methods that can be used to validate non-numeric data.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Write the Structured Query Language (SQL) script to add a new record in the table TREE to
store the following data:
Attribute Value
TreeID LOW_1276
ScientificName Salix_Alba
MaxHeight 30.00
FastGrowing TRUE
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
...................................................................................................................................................
............................................................................................................................................. [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(i) Explain the effect of increasing the sampling rate on the accuracy of the sound recording.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Explain the effect of decreasing the sampling resolution on the file size of the sound
recording.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
7 The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
LDD <address> Direct addressing. Load the contents of the location at the given address to
ACC
LDX <address> Indexed addressing. Form the address from <address> + the contents of the
index register. Copy the contents of this calculated address to ACC
LDR #n Immediate addressing. Load the number n to IX
STO <address> Store the contents of ACC at the given address
ADD <address> Add the contents of the given address to the ACC
ADD #n Add the denary number n to the ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
JMP <address> Jump to the given address
CMP <address> Compare the contents of ACC with the contents of <address>
CMI <address> Indirect addressing. The address to be used is at the given address. Compare
the contents of ACC with the contents of this second address
JPE <address> Following a compare instruction, jump to <address> if the compare was True
JPN <address> Following a compare instruction, jump to <address> if the compare was False
END Return control to the operating system
<address> can be an absolute or symbolic address
# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001101
(a) Trace the program currently in memory using the trace table, stopping when line 90 is
executed for a second time.
77 CMI 102
78 JPE 91
79 CMP 103
80 JPN 84
81 ADD 101
82 STO 101
83 JMP 86
84 INC ACC
85 STO 101
86 LDD 100
87 INC ACC
88 STO 100
89 INC IX
90 JMP 76
91 END
100 0
101 0
102 112
103 4
110 1
111 4
112 0
[5]
(b) The following table shows another part of the instruction set for the processor.
Instruction
Explanation
Opcode Operand
AND #n Bitwise AND operation of the contents of ACC with the operand
AND <address> Bitwise AND operation of the contents of ACC with the contents of <address>
XOR #n Bitwise XOR operation of the contents of ACC with the operand
XOR Bn Bitwise XOR operation of the contents of ACC with the binary number n
XOR <address> Bitwise XOR operation of the contents of ACC with the contents of <address>
OR #n Bitwise OR operation of the contents of ACC with the operand
OR <address> Bitwise OR operation of the contents of ACC with the contents of <address>
LSL #n Bits in ACC are shifted logically n places to the left. Zeros are introduced on
the right-hand end
LSR #n Bits in ACC are shifted logically n places to the right. Zeros are introduced on
the left-hand end
<address> can be an absolute or symbolic address
# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001101
50 01001101
51 10001111
0 1 0 1 0 0 1 1
Show the contents of the ACC after the execution of the following instruction.
XOR B00011111
...........................................................................................................................................
...........................................................................................................................................
[1]
0 1 0 1 0 0 1 1
Show the contents of the ACC after the execution of the following instruction.
AND 50
...........................................................................................................................................
...........................................................................................................................................
[1]
0 1 0 1 0 0 1 1
Show the contents of the ACC after the execution of the following instruction.
LSL #3
...........................................................................................................................................
...........................................................................................................................................
[1]
0 1 0 1 0 0 1 1
Show the contents of the ACC after the execution of the following instruction.
OR 51
...........................................................................................................................................
...........................................................................................................................................
[1]
(c) Write the register transfer notation for each of the stages in the fetch-execute cycle described
in the table.
8 The following bitmap image has a resolution of 4096 × 4096 pixels and a colour depth of 24 bits
per pixel.
The image is displayed on a monitor that has a screen resolution of 1920 × 1080 pixels.
(a) Tick (3) one box in each row to identify the effect of each action on the image file size.
(b) State two benefits of creating a vector graphic instead of a bitmap image.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(c) A second bitmap image is stored using a colour depth of 8 bits per pixel.
(i) The table shows the compressed and uncompressed values for parts of the image file.
Complete the table. The first row has been completed for you.
32 32 80 81 81
[2]
Explain why lossless compression is more appropriate than lossy compression for a
text file.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
Describe the social impact of using facial recognition software to identify individuals in an airport.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [2]
10 A Local Area Network (LAN) consists of four computers, one server and a switch.
(a) Complete the following diagram to show how the hardware is connected.
Switch
[1]
(b) A router is attached to one of the devices on the LAN shown in part (a) to connect the LAN to
the internet.
Device ...............................................................................................................................
Reason ..............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(ii) Describe the role and function of the router in the network.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(a) Tick () one box in each row to identify the effect of each action on the accuracy of the
recording.
(b) The audio message is recorded with a sampling rate of 50 kHz and a sampling resolution of
16 bits.
Working .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Explain the purpose of a buffer in a computer system using one other example.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
2 The relational database ASTRONOMY is used to store data about telescopes, the companies that
own the telescopes and the photographs taken by the telescopes.
(a) Complete the following table by writing the correct answer for each item.
Item Answer
[3]
Identify the feature that describes the relationship between data and its structure.
............................................................................................................................................. [1]
(c) Complete the SQL script to return the total number of telescopes owned by the company
whose ID begins with HW.
FROM TELESCOPE
(d) Write the SQL script to add one field to the table PHOTOGRAPH to store the resolution of the
photograph, e.g. 1920 × 1068.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Complete the statements about bitmap images by writing the missing words.
of the file.
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
3 Draw one line from each Operating System (OS) management task to its most appropriate
description.
hardware management
security management
memory management
process management
[4]
4 (a) A Central Processing Unit (CPU) contains several special purpose registers and other
components.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(ii) State when interrupts are detected during the Fetch-Execute (F-E) cycle.
...........................................................................................................................................
..................................................................................................................................... [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) Upgrading secondary storage to solid state typically improves the performance of computer
systems.
Identify one other upgrade to the hardware and explain why it improves the performance of
a computer system.
Upgrade ....................................................................................................................................
Explanation ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
B X
[3]
Working space
P Q R Y
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[2]
6 The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
LDD <address> Direct addressing. Load the contents of the location at the given
address to ACC
LDX <address> Indexed addressing. Form the address from <address> + the contents
of the index register. Copy the contents of this calculated address to
ACC
LDR #n Immediate addressing. Load the number n to IX
MOV <register> Moves the contents of the accumulator to the given register (IX)
STO <address> Store contents of ACC at the given address
ADD <address> Add the contents of the given address to the ACC
ADD #n Add the denary number n to the ACC
SUB #n Subtract the denary number n from the ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
JMP <address> Jump to the given address
CMP #n Compare the contents of ACC with number n
CMI <address> Indirect addressing. The address to be used is at the given address.
Compare the contents of ACC with the contents of this second
address
JPE <address> Following a compare instruction, jump to <address> if the compare
was True
JPN <address> Following a compare instruction, jump to <address> if the compare
was False
OUT Output to the screen the character whose ASCII value is stored in
ACC
END Return control to the operating system
<address> can be an absolute or a symbolic address
# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001101
(a) The current contents of main memory and selected values from the ASCII character set are
given.
(i) Trace the program currently in memory using the trace table.
100 1
101 0
110 97
111 98
112 97
ASCII Character
value
49 1
50 2
51 3
52 4
65 A
66 B
67 C
68 D
[4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(b) The following table shows another part of the instruction set for the processor.
Instruction
Explanation
Opcode Operand
AND #n Bitwise AND operation of the contents of ACC with the operand
AND Bn Bitwise AND operation of the contents of ACC with the binary number n
AND <address> Bitwise AND operation of the contents of ACC with the contents of <address>
XOR #n Bitwise XOR operation of the contents of ACC with the operand
XOR <address> Bitwise XOR operation of the contents of ACC with the contents of <address>
OR #n Bitwise OR operation of the contents of ACC with the operand
OR Bn Bitwise OR operation of the contents of ACC with the binary number n
OR <address> Bitwise OR operation of the contents of ACC with the contents of <address>
LSL #n Bits in ACC are shifted logically n places to the left. Zeros are introduced on
the right-hand end
LSR #n Bits in ACC are shifted logically n places to the right. Zeros are introduced on
the left-hand end
<address> can be an absolute or a symbolic address
# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001101
0 0 1 1 0 1 1 0
Show the contents of the ACC after the execution of the following instruction.
AND B01001100
...........................................................................................................................................
...........................................................................................................................................
[1]
1 0 0 1 0 1 0 1
Show the contents of the ACC after the execution of the following instruction.
OR B01001111
...........................................................................................................................................
...........................................................................................................................................
[1]
1 0 0 1 1 1 0 1
Show the contents of the ACC after the execution of the following instruction.
LSR #2
...........................................................................................................................................
...........................................................................................................................................
[1]
...................................................................................................................................................
............................................................................................................................................. [1]
7 (a) The diagram shows the hardware and software used to retrieve files stored on the cloud.
Internet
Laptop Firewall A Service X
Provider
Complete the following table by writing the answer for each row.
Answer
A type of cloud, X
(b) Give one advantage and two disadvantages of transmitting data using satellites instead of
copper cables.
Advantage 1 .............................................................................................................................
...................................................................................................................................................
Disadvantage 1 .........................................................................................................................
...................................................................................................................................................
Disadvantage 2 .........................................................................................................................
...................................................................................................................................................
[3]
(i) Give two benefits of dividing a network into subnetworks by subnetting the LAN.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
10.10.12.1 255.0.0.0
192.168.12.4 255.255.255.0
...........................................................................................................................................
...........................................................................................................................................
[2]
8 (a) (i) Explain why some programs are distributed under an open source licence.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Explain how a programmer benefits from distributing a program under a commercial
licence.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(b) A commercial program for a vehicle repair garage includes an Artificial Intelligence (AI)
module that can diagnose faults and suggest repairs.
Describe one economic impact the AI module may have on the garage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
10010011
10010011
(b) State two benefits of using Binary Coded Decimal (BCD) to represent values.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) (i) Identify one sensor that could be used in a car alarm system.
Sensor ...............................................................................................................................
Justification .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]