Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
com
COMPUTING 9691/12
Paper 1 October/November 2011
1 hour 30 minutes
Candidates answer on the Question Paper.
No additional materials are required.
No calculators allowed.
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
IB11 11_9691_12/2RP
© UCLES 2011 [Turn over
www.maxpapers.com
2
[2]
[4]
[4]
2 (a) In the system development life cycle describe what is involved when analysing the For
requirements of a system. Examiner's
Use
[4]
(b) When a new system is developed it must be installed into the organisation for which it
has been produced.
Describe:
[2]
[2]
3 An educational game is being produced to help very young children learn about numbers. For
Describe the characteristics of the user interface and why they are appropriate to the Examiner's
Use
application.
[5]
4 Explain how a knowledge-based (expert) system can be set up and used to identify mineral
samples collected by geologists.
[6]
[2]
(ii) Explain how the contents of a two-dimensional array can be initialised to zero.
[4]
[4]
6 State an example of each of the following types of storage medium and give a use for each. For
Examiner's
Use
(i) Magnetic
Example
Use
[2]
Example
Use
[2]
7 (a) A mail order company allows customers to make orders by telephoning operators. The For
operators type the details of the order at a terminal. Examiner's
Use
(i) Explain why the operators use a forms-based interface for taking the details of the
orders.
[3]
(ii) The orders are stored in a random access file. Explain how a new order can be
stored using the order ID.
[3]
[4]
8 A building firm has a main office with stand-alone computers for the workers to use. For
It is decided to link these stand-alone computers to make a network. Examiner's
Use
(a) State two items of hardware and one type of software which would be necessary to
create the network.
Hardware 1
Hardware 2
Software
[3]
[4]
(c) Describe how the following types of generic applications software can be used by the For
firm: Examiner's
Use
[2]
(ii) Spreadsheet
[2]
(d) The firm has a warehouse where all materials used in the building work are stored.
Explain how a stock control system can be used to monitor the stock in the warehouse.
It should ensure that work does not have to stop because the firm has run out of an
item.
[5]
9 (a) Complete the table to show the outputs for the possible inputs to this circuit. For
Examiner's
Use
A W
OR
AND S
X
NOT
B AND C
A B W X C S
0 0
0 1
1 0
1 1
[5]
[1]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
COMPUTING 9691/13
Paper 1 October/November 2011
1 hour 30 minutes
Candidates answer on the Question Paper.
No additional materials are required.
No calculators allowed.
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
IB11 11_9691_13/3RP
© UCLES 2011 [Turn over
www.maxpapers.com
2
[2]
Device 1
Purpose
Device 2
Purpose
[4]
(c) Customers may apply for a store card if they do not have one already. The store card For
allows customers discount when they buy goods. They apply for a store card at the Examiner's
Use
checkout and the applications are then batch processed.
[4]
2 (a) One stage of the systems development life cycle is to collect information about the For
requirements of the system. Examiner's
Use
For each of the following methods of information collection give one advantage and
one disadvantage.
(i) Questionnaires
Advantage
Disadvantage
[2]
(ii) Interviews
Advantage
Disadvantage
[2]
(b) When a new system has been developed it must be installed into the organisation for
which it has been produced.
Describe:
[2]
[2]
3 A large power-generating plant is controlled from a central operations room. The operations For
are controlled by a small group of very experienced engineers using computers which Examiner's
Use
monitor the processes being carried out.
Describe the characteristics of the user interface and why they are appropriate to this
application.
[5]
4 Explain how a knowledge-based (expert) system can be set up and used to help scientists
at a national botanical centre to identify plants.
[6]
5 (a) Describe how the contents of a one-dimensional array can be initialised to zero. For
Examiner's
Use
[3]
[4]
(ii) Describe how a check can be carried out before adding another value to the stack.
[3]
Storage medium 1
Use
Storage medium 2
Use
[4]
7 (a) An information system is provided at a central location in a tourist resort. Tourists are For
able to use it to find details of: Examiner's
Use
• current events
• hotels and other accommodation
• transport available.
(i) Explain why a menu-based interface is used with the information system.
(ii) Explain why indexed sequential access to the data is used on the system.
[6]
(b) The central information office takes bookings from tourists for all the events and hotels For
that are featured in the information system. Examiner's
Use
[4]
(a) (i) State two items of hardware which would be necessary to network the computers.
Hardware 1
Hardware 2
[2]
(ii) State one extra item of hardware which would be required if the network was to be
linked to the Internet.
[1]
[4]
(c) The production line in the factory is computerised. One part of the production line is a For
pair of rollers which take warm plastic as an input and roll it into sheets for the next part Examiner's
Use
of the process. The rollers have to be kept the same distance apart throughout the
process. This is controlled by a computer which monitors the output from the rollers.
(i) Explain why the company use custom-written software on the computer that
controls the rollers.
[2]
(ii) The thickness of the plastic sheets should be 5mm. The computer can control the
thickness by moving the rollers closer together or further apart.
Explain why the computer is set to keep the thickness between 4.9mm and 5.1mm
and not exactly 5mm.
[2]
(iii) Explain the process control system which the computer uses to control the
thickness of the plastic sheets.
[5]
9 (a) Complete the table to show the outputs for the possible inputs to this circuit. For
Examiner's
Use
A C
AND NOT D
B
A B C D
0 0
0 1
1 0
1 1
[2]
(b) Complete the table to show the outputs for the possible inputs to this circuit.
A
AND NOT E
B
AND NOT F
A B E F
0 0
0 1
1 0
1 1
[4]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
COMPUTING 9691/22
Paper 2 October/November 2011
2 hours
Candidates answer on the Question Paper.
No additional materials are required.
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
IB11 11_9691_22/2RP
© UCLES 2011 [Turn over
www.maxpapers.com
2
1 Nathan is designing a software solution for stock control in a mobile phone shop. He has a For
colleague called Andre who will help him write the program. Nathan decides to modularise Examiner's
Use
the solution.
[1]
(b) As the first step in his design he splits the solution into the following main areas:
StockControl
StockOrdering
[1]
(d) Nathan will write the PlaceOrder module and Andre will write the ReceiveGoods For
module. Nathan will use the identifier OrderValue for the value of an order placed. Examiner's
Use
Andre will use the identifier OrderValue for the total value of the received goods.
Explain how they can both use the same identifier and not cause a problem when the
program is run.
[2]
(e) (i) Explain why there are some words that cannot be used as variable identifiers.
[1]
Language
(iii) Both programmers need to choose other identifiers that they use.
State three other rules of a high-level programming language that restrict the
choice of identifiers.
Language
Rule 1
Rule 2
Rule 3
[3]
(i) Work out the value of this expression when a is 600 and b is 200.
[1]
(ii) The programmer has made an error in the code. When a is 600 and b is 200 the
expected answer is 40.
Rewrite the line of code with added parentheses to give the expected result.
[1]
(iii) Name the type of testing strategy which identified this error.
[1]
2 [2]
(ii) Nathan has written the PhoneSales module, which now needs testing. For
Examiner's
Use
• ContractLength, the number of months of the contract, can be only 12, 18 or 24
• FreeTexts, the number of free text messages per month must be in the range
0 to 600
Give six different items of test data other than invalid data which thoroughly test
the two rules given above. Give a reason for each choice.
[6]
[2]
[2]
(iii) Describe a possible problem that could occur if ContractLength is not validated.
[2]
2 Ahmed is writing a program to record the data of members of the school football squad. For
The input data will be validated. One input is the number of years a member has played for Examiner's
Use
the team. This will be 0, 1 or 2.
The flowchart for the validation of number of years is shown below.
INPUT
NumberOfYears
CASE:
NumberOfYears
[1]
[1]
(b) In a high-level language, write the code that will produce the validation process shown For
in the flowchart. Examiner's
Use
Language
Code
[5]
(c) The three basic programming constructs used to control the flow of information are:
sequence, selection and iteration.
2 [1]
[2]
(e) Ahmed thinks it will be a good idea to allow only five attempts at getting the input data For
correct. If it is not a valid entry after five attempts, then a message 'Please check Examiner's
Use
which values are allowed' should be output.
INPUT
NumberOfYears
CASE:
NumberOfYears
[5]
(f) Ahmed needs to store more information about the players. He creates a record
structure that contains PlayerID (a whole number between 1 and 50), Sex (m or f),
PlayerName, NumberOfYears and DateOfBirth. Complete the table.
PlayerID
Sex
PlayerName
NumberOfYears
DateOfBirth
[10]
(g) The squad has 30 members. Ahmed stores the records in an array called Squad. To For
calculate how many females there are he designs this pseudocode. Examiner's
Use
NoOfFemales ← 0
Index ← 1
WHILE Index < 30
IF Squad[Index].Sex = 'f'
THEN
NoOfFemales ← NoOfFemales + 1
ENDIF
Index ← Index + 1
ENDWHILE
This pseudocode will only consider the first 29 records in the array.
[1]
[1]
(iii) Rewrite the line to ensure that the pseudocode will consider all 30 records.
[1]
(h) Write this updated pseudocode using a FOR loop ensuring that it will check all records
in the array.
[3]
(a) Complete the trace of this function for the function call Surprise('cab').
LENGTH
MyWord i TempNo TempWord[1] TempWord[2] TempWord[3] Surprise
(MyWord)
cab
100
[3]
[1]
[2]
[3]
(e) Aisha has written her pseudocode so that it should be easily understood.
(i) State two techniques that she has used in her pseudocode to do this.
[2]
TempNo ← ASCII(MyWord[i]) + 1
TempWord[i] ← CHAR(TempNo)
[3]
(f) Aisha finds out that there is a string manipulation function called CONCATENATION. For
Examiner's
Use
State what is meant by concatenation.
[2]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
COMPUTING 9691/23
Paper 2 October/November 2011
2 hours
Candidates answer on the Question Paper.
No additional materials are required.
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
IB11 11_9691_23/2RP
© UCLES 2011 [Turn over
www.maxpapers.com
2
1 Nathan is designing a software solution for stock control in a computer shop. He has a For
colleague, called Andre, who will help him write the program. Nathan decides to Examiner's
Use
modularise the solution.
[1]
(b) As the first step in his design he splits the solution into the following main areas:
StockControl
SalesReport
[1]
(d) Nathan will write the MonthlySalesReport module and Andre will write the
AnnualSalesReport module. Nathan will use the identifier Profit for the monthly profit,
and Andre will use the identifier Profit for the annual profit.
Explain how they can both use the same identifier and not cause a problem when the
program is run.
[2]
(e) (i) Explain why there are some words that cannot be used as identifiers. For
Examiner's
Use
[1]
(ii) Both programmers need to choose other identifiers that they use.
State three rules of a high-level programming language that restrict the choice of
identifiers.
Language
Rule 1
Rule 2
Rule 3
[3]
Language
(f) While they are working on the SalesReport modules, they use the expression:
PercentageIncrease = a+b/100
(i) Work out the value of PercentageIncrease when a is 600 and b is 400.
[1]
The programmer has made an error in the code. When a is 600 and b is 400, the
expected result is 10.
(ii) Rewrite the line of code with added parentheses to give the expected result.
[1]
(iii) Name the type of testing strategy which identified this error.
[1]
2 [2]
(ii) Andre has written the Sales module, which now needs testing.
• InvoiceNumber has the format yy-nnnn e.g. 11-0035 is the 35th invoice of the
year 2011
• PromotionCode can be 'gold', 'silver' or 'bronze' only
Give six different items of test data, other than invalid data, which thoroughly test
the two rules given above. Give a reason for each choice.
[6]
[2]
(ii) Describe the problems that could occur if PromotionCode is not validated.
[2]
(iii) Design a screen which lets the user choose which type of sales report they would
like to view.
[2]
2 Ahmed is writing a program to record the data of members of the school hockey club. For
The input data will be validated. One input will be the playing position of each member. Is Examiner's
Use
he/she a forward, defender or goalkeeper? These will be entered as F, D or G.
The flowchart for the validation of the playing position is shown below.
INPUT Position
Yes
Position=‘F’?
No
Yes
Position=‘D’?
No
No
OUTPUT ‘Invalid
data. Try again’
[1]
[1]
(b) In a high-level language, write the code that will produce the validation process shown For
in the flowchart. Examiner's
Use
Language
Code
[5]
(c) The three basic programming constructs used to control the flow of information are:
sequence, selection and iteration.
[1]
[2]
(e) Ahmed thinks it will be a good idea to allow only four attempts at getting the input data For
correct. If it is not a valid entry after four attempts a message 'Please enter D, F or G' Examiner's
Use
should be output. Modify the flowchart to include this additional check.
INPUT Position
Yes
Position=‘F’?
No
Yes
Position=‘D’?
No
No
OUTPUT ‘Invalid
data. Try again’
[5]
(f) Ahmed needs to store more information about the players. He creates a record
structure that contains PlayerID (a whole number between 1 and 50), Sex (m or f),
PlayerName, Position (F, D or G), and DateOfBirth. Complete the table.
PlayerID
Sex
PlayerName
Position
DateofBirth
[10]
(g) The club has 45 members. Ahmed stores the records in an array called Club. To For
calculate the number of goalkeepers he designs this pseudocode: Examiner's
Use
Gtotal ← 0
Index ← 1
REPEAT
IF Club[Index].Position = 'G'
THEN
Gtotal ← Gtotal + 1
Index ← Index + 1
UNTIL Index = 45
[1]
[1]
(iii) Rewrite the line to ensure the pseudocode considers all 45 records.
[1]
(h) Write this updated pseudocode using a FOR loop ensuring that it will check all records
in the array.
[3]
(a) Complete the trace of this function for the function call Surprise('CHO JABA').
CHO JABA
[3]
[1]
[2]
[3]
(i) She could have annotated her code with suitable comments.
[2]
(ii) State two techniques, other than annotation, that she should use to improve the
understanding of her pseudocode.
[2]
[3]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
COMPUTING 9691/31
Paper 3 October/November 2011
2 hours
Candidates answer on the Question Paper.
No additional materials are required.
No calculators allowed.
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
IB11 11_9691_31/2RP
© UCLES 2011 [Turn over
www.maxpapers.com
2
1 Describe the following components of a typical PC operating system and explain how they For
are used. Examiner's
Use
[3]
[3]
[3]
(b) Describe the use of the following special purpose registers and how they change
during the fetch-execute cycle.
[3]
[3]
3 (a) Convert the following denary numbers into 10-bit, sign and magnitude, binary numbers: For
Examiner's
Use
(i) -390
(ii) -47
[3]
(b) Convert the following denary numbers into 8-bit, two's complement, binary numbers:
(i) +93
[2]
(ii) - 69
[2]
(c) (i) Using the binary values from part (a) work out (-390) + (- 47), giving your answer in For
sign and magnitude form using 10-bit binary. You must show your working. Examiner's
Use
[3]
(ii) Using the binary values from part (b), work out 93 - 69, giving your answer in two's
complement form using 8-bit binary. You must show your working.
[4]
4 A health ministry has decided that it would be useful for doctors in that country to For
communicate using an intranet. Examiner's
Use
Patient records could be shared and advice could be given by the doctors.
[3]
(b) Explain why an intranet was used rather than an open network like the World Wide
Web.
[5]
5 Robotic arms are used on the production line in a car factory. For
Examiner's
Use
(a) State one input device and one output device which would be used to ensure that a
robot can carry out its task on the production line.
In each case explain why it would be necessary.
[4]
(b) Explain why robots are used on the production line to replace workers.
[4]
(c) Robots are used to spray paint the car bodies. For
Describe what would need to be done with the robots in the painting area for the Examiner's
Use
production of a different car model.
[3]
[6]
7 (a) Explain the difference between storing data in a flat file and in a relational database. For
Examiner's
Use
[2]
(b) Data about patients, doctors and treatments in a hospital are stored in a relational
database.
Explain the advantages of using a relational database rather than a flat file to store the
hospital data.
[3]
(c) (i) Explain why access to the data in the database needs to be controlled.
[5]
[4]
(b) Explain how a stack is used to handle procedure calling and parameter passing.
[4]
9 (a) (i) Describe what happens during the lexical analysis phase of compilation. For
Examiner's
Use
[4]
[3]
(b) (i) Explain the value of using library routines when writing new programs.
[2]
(ii) Describe how linkers and loaders are used to make the use of library routines
possible.
[2]
<non-zero-digit> ::= 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
<digit> ::= 0 | <non-zero-digit>
<letter> ::= A | B | C | x | y | z
<group> ::= <letter> | <letter><group>
<variable-identifier> ::= <non-zero-digit><group><digit> | <non-zero-digit><group>
(i) 23A
(ii) 2X
(iii) 2ACB24
[3]
• non-zero-digit
• digit
• letter
• variable-identifier
[4]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
COMPUTING 9691/33
Paper 3 October/November 2011
2 hours
Candidates answer on the Question Paper.
No additional materials are required.
No calculators allowed.
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
IB11 11_9691_33/4RP
© UCLES 2011 [Turn over
www.maxpapers.com
2
[2]
(b) Explain how the boot program is used when a PC is turned on.
[4]
2 (a) Describe the use of the Memory Data Register (MDR). For
Explain how the contents change during the fetch-execute cycle. Examiner's
Use
[3]
(b) Name three types of bus that are used in a computer. For each one explain what it is
used for.
[6]
3 (a) Convert the following denary numbers into 8-bit, sign and magnitude, binary numbers: For
Examiner's
Use
(i) +39
(ii) - 47
[3]
(b) Convert the following denary numbers into 8-bit, two's complement, binary numbers:
(i) - 3
[2]
(ii) - 47
[2]
(c) A particular computer uses a single 10-bit word to store a floating-point representation For
of a number. Examiner's
Use
The first 6 bits are used to store the mantissa and the remaining 4 bits are used to
store the exponent.
1
(i) Explain why 000101 0100 = 2 using this notation.
2
[2]
[2]
By converting each of the mantissa and the exponent into a denary number first,
write this number in denary.
[3]
4 The health system in a country consists of a number of local surgeries. Individual doctors For
give medical assistance to people in the immediate area. In addition to this there are a Examiner's
Use
number of main hospitals. Each hospital provides services which the doctors are unable to
provide in their surgeries.
The main hospitals and the surgeries which they serve are linked by using an intranet.
[3]
(b) Explain the advantages and disadvantages of using an intranet rather than the Internet.
[5]
5 A new car is being designed. It is decided that different designs for the braking system For
should be tested using a computer simulation of each design rather than building Examiner's
Use
prototypes.
(a) Describe three advantages of using computer simulation when testing each design.
[6]
(b) Simulation allows for the braking system to be tested in different conditions.
Describe the variables in the simulation that would need to be changed in order to
replicate different driving conditions.
[5]
6 (a) Describe the advantages of using a relational database to store data rather than a flat For
file. Examiner's
Use
[3]
(b) Data about guests in a hotel are stored in a relational database. One part of the
database consists of a table of GUEST details. This is linked to a table ACCOUNT.
Whenever a guest orders something in the hotel, the charge for that service is stored in
the ACCOUNT table.
(i) State the primary key of the GUEST table, justifying your choice.
[2]
(ii) State a secondary key in the ACCOUNT table, justifying your choice.
[2]
[1]
(iv) State a foreign key in the ACCOUNT table, justifying your choice.
[2]
7 (a) Explain how variables are managed during the different stages of compilation of a For
high-level language program. Examiner's
Use
[7]
(b) (i) Give two advantages of using a compiler rather than an interpreter to translate a
high-level language program.
[2]
[2]
8 Explain how the following memory management techniques may be used: For
Examiner's
Use
(i) Paging
(ii) Segmentation
[6]
(i) Declarative
(ii) Procedural
[2]
(b) The class diagram shows some of the information about plants on sale in a garden For
centre. Examiner's
Use
Plant
SoilType
Cost
...
getSoilType()
getCost()
...
Tree Bulb
WoodType Colour
CountryOfOrigin
...
getWoodType() getColour()
getCountryOfOrigin()
...
Use the diagram to help you explain the meaning of the terms:
(i) Class
[2]
(ii) Inheritance
[2]
(iii) Encapsulation
[2]
10 Workers in a factory each have an identity code which identifies their record in the For
computer system. Examiner's
Use
The identity code contains letters and numbers and is defined using BNF (Backus-Naur
form) as:
(i) 2BA
(ii) XAA
(iii) ACB021
[3]
(b) The definition is changed to allow only a number which begins with a 1 or a 2. The first
digit in the number is now defined as
<non-zero-digit> ::= 1 | 2
Draw a syntax diagram to show the definition of an identity code using only the terms:
• non-zero-digit
• digit
• letter
• identity-code
[4]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.