Sei sulla pagina 1di 72

www.maxpapers.

com

UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS


General Certificate of Education
Advanced Subsidiary Level and Advanced Level
*0173836201*

COMPUTING 9691/12
Paper 1 October/November 2011
1 hour 30 minutes
Candidates answer on the Question Paper.
No additional materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names for software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

This document consists of 10 printed pages and 2 blank pages.

IB11 11_9691_12/2RP
© UCLES 2011 [Turn over
www.maxpapers.com
2

1 (a) State the purpose of the following: For


Examiner's
Use
(i) Input devices

(ii) Output devices.

[2]

(b) A point-of-sale (POS) terminal in a supermarket has a number of input devices.


State two different input devices used at the POS terminal and state the purpose of
each.

[4]

(c) A number of point-of-sale terminals are controlled by a multi-user operating system.


Describe a multi-user operating system.

[4]

© UCLES 2011 9691/12/O/N/11


www.maxpapers.com
3

2 (a) In the system development life cycle describe what is involved when analysing the For
requirements of a system. Examiner's
Use

[4]

(b) When a new system is developed it must be installed into the organisation for which it
has been produced.

Describe:

(i) direct implementation

[2]

(ii) phased implementation

[2]

© UCLES 2011 9691/12/O/N/11 [Turn over


www.maxpapers.com
4

3 An educational game is being produced to help very young children learn about numbers. For
Describe the characteristics of the user interface and why they are appropriate to the Examiner's
Use
application.

[5]

4 Explain how a knowledge-based (expert) system can be set up and used to identify mineral
samples collected by geologists.

[6]

© UCLES 2011 9691/12/O/N/11


www.maxpapers.com
5

5 (a) (i) Describe the structure of a two-dimensional array. For


Examiner's
Use

[2]

(ii) Explain how the contents of a two-dimensional array can be initialised to zero.

[4]

(b) Describe how a stack is implemented using an array.

[4]

© UCLES 2011 9691/12/O/N/11 [Turn over


www.maxpapers.com
6

6 State an example of each of the following types of storage medium and give a use for each. For
Examiner's
Use
(i) Magnetic

Example

Use

[2]

(ii) Solid state

Example

Use

[2]

© UCLES 2011 9691/12/O/N/11


www.maxpapers.com
7

7 (a) A mail order company allows customers to make orders by telephoning operators. The For
operators type the details of the order at a terminal. Examiner's
Use

(i) Explain why the operators use a forms-based interface for taking the details of the
orders.

[3]

(ii) The orders are stored in a random access file. Explain how a new order can be
stored using the order ID.

[3]

(b) On a regular basis, data is archived.

(i) Explain what is meant by archiving.

(ii) Describe the reasons why it is necessary.

[4]

© UCLES 2011 9691/12/O/N/11 [Turn over


www.maxpapers.com
8

8 A building firm has a main office with stand-alone computers for the workers to use. For
It is decided to link these stand-alone computers to make a network. Examiner's
Use

(a) State two items of hardware and one type of software which would be necessary to
create the network.

Hardware 1

Hardware 2

Software

[3]

(b) When data is passed around a network it can be corrupted.


Explain how check sums can be used to detect errors in transmitted data.

[4]

© UCLES 2011 9691/12/O/N/11


www.maxpapers.com
9

(c) Describe how the following types of generic applications software can be used by the For
firm: Examiner's
Use

(i) Word processor

[2]

(ii) Spreadsheet

[2]

(d) The firm has a warehouse where all materials used in the building work are stored.
Explain how a stock control system can be used to monitor the stock in the warehouse.
It should ensure that work does not have to stop because the firm has run out of an
item.

[5]

© UCLES 2011 9691/12/O/N/11 [Turn over


www.maxpapers.com
10

9 (a) Complete the table to show the outputs for the possible inputs to this circuit. For
Examiner's
Use
A W
OR
AND S
X

NOT

B AND C

A B W X C S

0 0

0 1

1 0

1 1
[5]

(b) State a possible use for this circuit in a processor.

[1]

© UCLES 2011 9691/12/O/N/11


www.maxpapers.com
11

BLANK PAGE

© UCLES 2011 9691/12/O/N/11


www.maxpapers.com
12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2011 9691/12/O/N/11


www.maxpapers.com

UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS


General Certificate of Education
Advanced Subsidiary Level and Advanced Level
*5132257072*

COMPUTING 9691/13
Paper 1 October/November 2011
1 hour 30 minutes
Candidates answer on the Question Paper.
No additional materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names for software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

This document consists of 12 printed pages.

IB11 11_9691_13/3RP
© UCLES 2011 [Turn over
www.maxpapers.com
2

1 (a) Describe the purpose of the following: For


Examiner's
Use
(i) Input devices;

(ii) Output devices.

[2]

(b) A point-of-sale (POS) terminal in a supermarket has a number of output devices.


State two different output devices used at the POS terminal and state the purpose of
each.

Device 1

Purpose

Device 2

Purpose

[4]

© UCLES 2011 9691/13/O/N/11


www.maxpapers.com
3

(c) Customers may apply for a store card if they do not have one already. The store card For
allows customers discount when they buy goods. They apply for a store card at the Examiner's
Use
checkout and the applications are then batch processed.

Describe a batch processing operating system.

[4]

© UCLES 2011 9691/13/O/N/11 [Turn over


www.maxpapers.com
4

2 (a) One stage of the systems development life cycle is to collect information about the For
requirements of the system. Examiner's
Use
For each of the following methods of information collection give one advantage and
one disadvantage.

(i) Questionnaires

Advantage

Disadvantage

[2]

(ii) Interviews

Advantage

Disadvantage

[2]

(b) When a new system has been developed it must be installed into the organisation for
which it has been produced.

Describe:

(i) parallel implementation

[2]

(ii) pilot implementation

[2]

© UCLES 2011 9691/13/O/N/11


www.maxpapers.com
5

3 A large power-generating plant is controlled from a central operations room. The operations For
are controlled by a small group of very experienced engineers using computers which Examiner's
Use
monitor the processes being carried out.
Describe the characteristics of the user interface and why they are appropriate to this
application.

[5]

4 Explain how a knowledge-based (expert) system can be set up and used to help scientists
at a national botanical centre to identify plants.

[6]

© UCLES 2011 9691/13/O/N/11 [Turn over


www.maxpapers.com
6

5 (a) Describe how the contents of a one-dimensional array can be initialised to zero. For
Examiner's
Use

[3]

(b) (i) Describe how a stack is implemented using an array.

[4]

(ii) Describe how a check can be carried out before adding another value to the stack.

[3]

© UCLES 2011 9691/13/O/N/11


www.maxpapers.com
7

6 State two different types of optical storage medium. For


Give a use that a school student could make of each with their computer at home. Examiner's
Use

Storage medium 1

Use

Storage medium 2

Use

[4]

© UCLES 2011 9691/13/O/N/11 [Turn over


www.maxpapers.com
8

7 (a) An information system is provided at a central location in a tourist resort. Tourists are For
able to use it to find details of: Examiner's
Use

• current events
• hotels and other accommodation
• transport available.

(i) Explain why a menu-based interface is used with the information system.

(ii) Explain why indexed sequential access to the data is used on the system.

[6]

© UCLES 2011 9691/13/O/N/11


www.maxpapers.com
9

(b) The central information office takes bookings from tourists for all the events and hotels For
that are featured in the information system. Examiner's
Use

(i) Explain why taking back-ups of the information collected is necessary.

(ii) Describe a procedure for doing these back-ups.

[4]

© UCLES 2011 9691/13/O/N/11 [Turn over


www.maxpapers.com
10

8 A factory specialises in making components for cars. For


The offices of the factory have a number of stand-alone computers. The decision is taken to Examiner's
Use
link these machines in a network.

(a) (i) State two items of hardware which would be necessary to network the computers.

Hardware 1

Hardware 2

[2]

(ii) State one extra item of hardware which would be required if the network was to be
linked to the Internet.

[1]

(b) When data is transmitted around a network it can be corrupted.


Explain, giving examples, how parity can be used to detect errors in transmitted data.

[4]

© UCLES 2011 9691/13/O/N/11


www.maxpapers.com
11

(c) The production line in the factory is computerised. One part of the production line is a For
pair of rollers which take warm plastic as an input and roll it into sheets for the next part Examiner's
Use
of the process. The rollers have to be kept the same distance apart throughout the
process. This is controlled by a computer which monitors the output from the rollers.

(i) Explain why the company use custom-written software on the computer that
controls the rollers.

[2]

(ii) The thickness of the plastic sheets should be 5mm. The computer can control the
thickness by moving the rollers closer together or further apart.

Explain why the computer is set to keep the thickness between 4.9mm and 5.1mm
and not exactly 5mm.

[2]

(iii) Explain the process control system which the computer uses to control the
thickness of the plastic sheets.

[5]

© UCLES 2011 9691/13/O/N/11 [Turn over


www.maxpapers.com
12

9 (a) Complete the table to show the outputs for the possible inputs to this circuit. For
Examiner's
Use

A C
AND NOT D
B

A B C D

0 0

0 1

1 0

1 1
[2]

(b) Complete the table to show the outputs for the possible inputs to this circuit.

A
AND NOT E
B

AND NOT F

A B E F

0 0

0 1

1 0

1 1
[4]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2011 9691/13/O/N/11


www.maxpapers.com

UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS


General Certificate of Education
Advanced Subsidiary Level and Advanced Level
*3626721815*

COMPUTING 9691/22
Paper 2 October/November 2011
2 hours
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

This document consists of 12 printed pages.

IB11 11_9691_22/2RP
© UCLES 2011 [Turn over
www.maxpapers.com
2

1 Nathan is designing a software solution for stock control in a mobile phone shop. He has a For
colleague called Andre who will help him write the program. Nathan decides to modularise Examiner's
Use
the solution.

(a) State why modularisation is a good idea.

[1]

(b) As the first step in his design he splits the solution into the following main areas:

Initialisation, PhoneSales, StockOrdering, Accounts.

Complete the following structure diagram.

StockControl

StockOrdering

[1]

(c) StockOrdering is made up of two modules, PlaceOrder and ReceiveGoods.

Add them to the structure diagram in (b). [2]

© UCLES 2011 9691/22/O/N/11


www.maxpapers.com
3

(d) Nathan will write the PlaceOrder module and Andre will write the ReceiveGoods For
module. Nathan will use the identifier OrderValue for the value of an order placed. Examiner's
Use
Andre will use the identifier OrderValue for the total value of the received goods.

Explain how they can both use the same identifier and not cause a problem when the
program is run.

[2]

(e) (i) Explain why there are some words that cannot be used as variable identifiers.

[1]

(ii) Give an example of an invalid identifier.

Language

Invalid identifier [1]

(iii) Both programmers need to choose other identifiers that they use.

State three other rules of a high-level programming language that restrict the
choice of identifiers.

Language

Rule 1

Rule 2

Rule 3

[3]

© UCLES 2011 9691/22/O/N/11 [Turn over


www.maxpapers.com
4

(f) One line in the program reads For


Examiner's
Use
SalesTax = a – b * 0.1

(i) Work out the value of this expression when a is 600 and b is 200.

[1]

(ii) The programmer has made an error in the code. When a is 600 and b is 200 the
expected answer is 40.

Rewrite the line of code with added parentheses to give the expected result.

[1]

(iii) Name the type of testing strategy which identified this error.

[1]

(g) One type of test data is invalid data.

(i) Name the other two types.

2 [2]

© UCLES 2011 9691/22/O/N/11


www.maxpapers.com
5

(ii) Nathan has written the PhoneSales module, which now needs testing. For
Examiner's
Use
• ContractLength, the number of months of the contract, can be only 12, 18 or 24
• FreeTexts, the number of free text messages per month must be in the range
0 to 600

Give six different items of test data other than invalid data which thoroughly test
the two rules given above. Give a reason for each choice.

ContractLength FreeTexts Reason

20 Invalid data for ContractLength

1000 Invalid data for FreeTexts

[6]

(h) (i) Write a Boolean expression to validate ContractLength.

[2]

(ii) Write a Boolean expression to validate FreeTexts.

[2]

(iii) Describe a possible problem that could occur if ContractLength is not validated.

[2]

© UCLES 2011 9691/22/O/N/11 [Turn over


www.maxpapers.com
6

2 Ahmed is writing a program to record the data of members of the school football squad. For
The input data will be validated. One input is the number of years a member has played for Examiner's
Use
the team. This will be 0, 1 or 2.
The flowchart for the validation of number of years is shown below.

INPUT
NumberOfYears

CASE:
NumberOfYears

OUTPUT ‘Invalid OUTPUT ‘Valid


data. Try again’ data entered’

(a) (i) What is the output when the input is 2?

[1]

(ii) What is the output when the input is 3?

[1]

© UCLES 2011 9691/22/O/N/11


www.maxpapers.com
7

(b) In a high-level language, write the code that will produce the validation process shown For
in the flowchart. Examiner's
Use

Language

Code

[5]

(c) The three basic programming constructs used to control the flow of information are:
sequence, selection and iteration.

State the two constructs that are used in your code.

2 [1]

(d) Describe what is meant by iteration.

[2]

© UCLES 2011 9691/22/O/N/11 [Turn over


www.maxpapers.com
8

(e) Ahmed thinks it will be a good idea to allow only five attempts at getting the input data For
correct. If it is not a valid entry after five attempts, then a message 'Please check Examiner's
Use
which values are allowed' should be output.

Modify the flowchart to include this additional check.

INPUT
NumberOfYears

CASE:
NumberOfYears

OUTPUT ‘Invalid OUTPUT ‘Valid


data. Try again’ data entered’

[5]

(f) Ahmed needs to store more information about the players. He creates a record
structure that contains PlayerID (a whole number between 1 and 50), Sex (m or f),
PlayerName, NumberOfYears and DateOfBirth. Complete the table.

Field Name Data Type Field Size (bytes)

PlayerID

Sex

PlayerName

NumberOfYears

DateOfBirth
[10]

© UCLES 2011 9691/22/O/N/11


www.maxpapers.com
9

(g) The squad has 30 members. Ahmed stores the records in an array called Squad. To For
calculate how many females there are he designs this pseudocode. Examiner's
Use
NoOfFemales ← 0
Index ← 1
WHILE Index < 30
IF Squad[Index].Sex = 'f'
THEN
NoOfFemales ← NoOfFemales + 1
ENDIF
Index ← Index + 1
ENDWHILE

This pseudocode will only consider the first 29 records in the array.

(i) State the name of this type of error.

[1]

(ii) State the line that needs changing.

[1]

(iii) Rewrite the line to ensure that the pseudocode will consider all 30 records.

[1]

(h) Write this updated pseudocode using a FOR loop ensuring that it will check all records
in the array.

[3]

© UCLES 2011 9691/22/O/N/11 [Turn over


www.maxpapers.com
10

3 Aisha is learning about manipulating strings in a high-level programming language. For


She has an idea that she wants to try. She produces the following design in pseudocode: Examiner's
Use
FUNCTION Surprise(MyWord : STRING) : STRING
LOOP FOR i ← 1 TO LENGTH(MyWord)
TempNo ← ASCII(MyWord[i]) + 1
TempWord[i] ← CHAR(TempNo)
ENDLOOP
Surprise ← TempWord
ENDFUNCTION

(a) Complete the trace of this function for the function call Surprise('cab').

LENGTH
MyWord i TempNo TempWord[1] TempWord[2] TempWord[3] Surprise
(MyWord)
cab

100

[3]

(b) State what this function does.

[1]

(c) Describe what Surprise ← TempWord does.

[2]

© UCLES 2011 9691/22/O/N/11


www.maxpapers.com
11

(d) High-level languages also use procedures. For


Examiner's
Use
Describe the features of a procedure.

[3]

(e) Aisha has written her pseudocode so that it should be easily understood.

(i) State two techniques that she has used in her pseudocode to do this.

[2]

(ii) One other technique to help understanding is to annotate using comments.

Write a suitable comment to annotate the lines:

TempNo ← ASCII(MyWord[i]) + 1
TempWord[i] ← CHAR(TempNo)

[3]

© UCLES 2011 9691/22/O/N/11 [Turn over


www.maxpapers.com
12

(f) Aisha finds out that there is a string manipulation function called CONCATENATION. For
Examiner's
Use
State what is meant by concatenation.

[2]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2011 9691/22/O/N/11


www.maxpapers.com

UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS


General Certificate of Education
Advanced Subsidiary Level and Advanced Level
*1459130115*

COMPUTING 9691/23
Paper 2 October/November 2011
2 hours
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

This document consists of 12 printed pages.

IB11 11_9691_23/2RP
© UCLES 2011 [Turn over
www.maxpapers.com
2

1 Nathan is designing a software solution for stock control in a computer shop. He has a For
colleague, called Andre, who will help him write the program. Nathan decides to Examiner's
Use
modularise the solution.

(a) State why modularisation is a good idea.

[1]

(b) As the first step in his design he splits the solution into the following main areas:

Initialisation, StockOrdering, Sales, SalesReport.

Complete the following structure diagram.

StockControl

SalesReport

[1]

(c) SalesReport is made up of two modules, MonthlySalesReport and AnnualSalesReport.

Add them to the structure diagram in (b). [2]

(d) Nathan will write the MonthlySalesReport module and Andre will write the
AnnualSalesReport module. Nathan will use the identifier Profit for the monthly profit,
and Andre will use the identifier Profit for the annual profit.

Explain how they can both use the same identifier and not cause a problem when the
program is run.

[2]

© UCLES 2011 9691/23/O/N/11


www.maxpapers.com
3

(e) (i) Explain why there are some words that cannot be used as identifiers. For
Examiner's
Use

[1]

(ii) Both programmers need to choose other identifiers that they use.

State three rules of a high-level programming language that restrict the choice of
identifiers.

Language

Rule 1

Rule 2

Rule 3

[3]

(iii) Give an example of an invalid identifier.

Language

Invalid identifier [1]

(f) While they are working on the SalesReport modules, they use the expression:

PercentageIncrease = a+b/100

(i) Work out the value of PercentageIncrease when a is 600 and b is 400.

[1]

The programmer has made an error in the code. When a is 600 and b is 400, the
expected result is 10.

(ii) Rewrite the line of code with added parentheses to give the expected result.

[1]

(iii) Name the type of testing strategy which identified this error.

[1]

© UCLES 2011 9691/23/O/N/11 [Turn over


www.maxpapers.com
4

(g) One type of test data is invalid data. For


Examiner's
Use
(i) Name the other two types.

2 [2]

(ii) Andre has written the Sales module, which now needs testing.

• InvoiceNumber has the format yy-nnnn e.g. 11-0035 is the 35th invoice of the
year 2011
• PromotionCode can be 'gold', 'silver' or 'bronze' only

Give six different items of test data, other than invalid data, which thoroughly test
the two rules given above. Give a reason for each choice.

InvoiceNumber PromotionCode Reason

130092 Invalid data for InvoiceNumber

glod Invalid data for PromotionCode

[6]

© UCLES 2011 9691/23/O/N/11


www.maxpapers.com
5

(h) (i) Write a Boolean expression to validate PromotionCode. For


Examiner's
Use

[2]

(ii) Describe the problems that could occur if PromotionCode is not validated.

[2]

(iii) Design a screen which lets the user choose which type of sales report they would
like to view.

[2]

© UCLES 2011 9691/23/O/N/11 [Turn over


www.maxpapers.com
6

2 Ahmed is writing a program to record the data of members of the school hockey club. For
The input data will be validated. One input will be the playing position of each member. Is Examiner's
Use
he/she a forward, defender or goalkeeper? These will be entered as F, D or G.
The flowchart for the validation of the playing position is shown below.

INPUT Position

Yes
Position=‘F’?

No

Yes
Position=‘D’?

No

Yes OUTPUT ‘Valid


Position=‘G’?
data entered’

No

OUTPUT ‘Invalid
data. Try again’

(a) (i) What is the output when the input is 'G'?

[1]

(ii) What is the output when the input is 'K'?

[1]

© UCLES 2011 9691/23/O/N/11


www.maxpapers.com
7

(b) In a high-level language, write the code that will produce the validation process shown For
in the flowchart. Examiner's
Use

Language

Code

[5]

(c) The three basic programming constructs used to control the flow of information are:
sequence, selection and iteration.

State the two constructs that are used in your code.

[1]

(d) Describe what is meant by iteration.

[2]

© UCLES 2011 9691/23/O/N/11 [Turn over


www.maxpapers.com
8

(e) Ahmed thinks it will be a good idea to allow only four attempts at getting the input data For
correct. If it is not a valid entry after four attempts a message 'Please enter D, F or G' Examiner's
Use
should be output. Modify the flowchart to include this additional check.

INPUT Position

Yes
Position=‘F’?

No

Yes
Position=‘D’?

No

Yes OUTPUT ‘Valid


Position=‘G’?
data entered’

No

OUTPUT ‘Invalid
data. Try again’

[5]

(f) Ahmed needs to store more information about the players. He creates a record
structure that contains PlayerID (a whole number between 1 and 50), Sex (m or f),
PlayerName, Position (F, D or G), and DateOfBirth. Complete the table.

Field Name Data Type Field Size (bytes)

PlayerID

Sex

PlayerName

Position

DateofBirth
[10]

© UCLES 2011 9691/23/O/N/11


www.maxpapers.com
9

(g) The club has 45 members. Ahmed stores the records in an array called Club. To For
calculate the number of goalkeepers he designs this pseudocode: Examiner's
Use
Gtotal ← 0
Index ← 1
REPEAT
IF Club[Index].Position = 'G'
THEN
Gtotal ← Gtotal + 1
Index ← Index + 1
UNTIL Index = 45

This will only look at the first 44 records in the array.

(i) State the name of this type of error.

[1]

(ii) State the line that needs changing.

[1]

(iii) Rewrite the line to ensure the pseudocode considers all 45 records.

[1]

(h) Write this updated pseudocode using a FOR loop ensuring that it will check all records
in the array.

[3]

© UCLES 2011 9691/23/O/N/11 [Turn over


www.maxpapers.com
10

3 Aisha is learning about manipulating strings in a high-level programming language. For


She has an idea that she wants to try. She produces the following design in pseudocode: Examiner's
Use
FUNCTION Surprise(s : string): string
x ← 1
REPEAT
q[x] ← s[x]
x ← x + 1
UNTIL s[x] = ' '
Surprise ← q
ENDFUNCTION

(a) Complete the trace of this function for the function call Surprise('CHO JABA').

s x q[1] q[2] q[3] q[4] Surprise

CHO JABA

[3]

(b) State the purpose of this function.

[1]

© UCLES 2011 9691/23/O/N/11


www.maxpapers.com
11

(c) Describe what Surprise ← q does. For


Examiner's
Use

[2]

(d) Describe the features of any function.

[3]

(e) Aisha’s pseudocode is not easily understood.

(i) She could have annotated her code with suitable comments.

Write a comment to annotate the line:

UNTIL s[x] = ' '

[2]

(ii) State two techniques, other than annotation, that she should use to improve the
understanding of her pseudocode.

[2]

© UCLES 2011 9691/23/O/N/11 [Turn over


www.maxpapers.com
12

(f) Aisha uses an expression: For


Examiner's
String1 > String2 Use

Explain how strings are compared by the processor.

[3]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2011 9691/23/O/N/11


www.maxpapers.com

UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS


General Certificate of Education Advanced Level
*2788786869*

COMPUTING 9691/31
Paper 3 October/November 2011
2 hours
Candidates answer on the Question Paper.
No additional materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names for software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

This document consists of 12 printed pages.

IB11 11_9691_31/2RP
© UCLES 2011 [Turn over
www.maxpapers.com
2

1 Describe the following components of a typical PC operating system and explain how they For
are used. Examiner's
Use

(a) File allocation table (FAT)

[3]

(b) Boot file

[3]

© UCLES 2011 9691/31/O/N/11


www.maxpapers.com
3

2 (a) Explain what is meant by Von Neumann architecture. For


Examiner's
Use

[3]

(b) Describe the use of the following special purpose registers and how they change
during the fetch-execute cycle.

(i) Program Counter (PC)

[3]

(ii) Current Instruction Register (CIR)

[3]

© UCLES 2011 9691/31/O/N/11 [Turn over


www.maxpapers.com
4

3 (a) Convert the following denary numbers into 10-bit, sign and magnitude, binary numbers: For
Examiner's
Use
(i) -390

(ii) -47

[3]

(b) Convert the following denary numbers into 8-bit, two's complement, binary numbers:

(i) +93

[2]

(ii) - 69

[2]

© UCLES 2011 9691/31/O/N/11


www.maxpapers.com
5

(c) (i) Using the binary values from part (a) work out (-390) + (- 47), giving your answer in For
sign and magnitude form using 10-bit binary. You must show your working. Examiner's
Use

[3]

(ii) Using the binary values from part (b), work out 93 - 69, giving your answer in two's
complement form using 8-bit binary. You must show your working.

[4]

© UCLES 2011 9691/31/O/N/11 [Turn over


www.maxpapers.com
6

4 A health ministry has decided that it would be useful for doctors in that country to For
communicate using an intranet. Examiner's
Use
Patient records could be shared and advice could be given by the doctors.

(a) Describe what is meant by an intranet.

[3]

(b) Explain why an intranet was used rather than an open network like the World Wide
Web.

[5]

© UCLES 2011 9691/31/O/N/11


www.maxpapers.com
7

5 Robotic arms are used on the production line in a car factory. For
Examiner's
Use
(a) State one input device and one output device which would be used to ensure that a
robot can carry out its task on the production line.
In each case explain why it would be necessary.

[4]

(b) Explain why robots are used on the production line to replace workers.

[4]

© UCLES 2011 9691/31/O/N/11 [Turn over


www.maxpapers.com
8

(c) Robots are used to spray paint the car bodies. For
Describe what would need to be done with the robots in the painting area for the Examiner's
Use
production of a different car model.

[3]

6 Explain how interrupts are handled by a computer system.

[6]

© UCLES 2011 9691/31/O/N/11


www.maxpapers.com
9

7 (a) Explain the difference between storing data in a flat file and in a relational database. For
Examiner's
Use

[2]

(b) Data about patients, doctors and treatments in a hospital are stored in a relational
database.

Explain the advantages of using a relational database rather than a flat file to store the
hospital data.

[3]

(c) (i) Explain why access to the data in the database needs to be controlled.

(ii) Describe how this can be achieved.

[5]

© UCLES 2011 9691/31/O/N/11 [Turn over


www.maxpapers.com
10

8 (a) State the meaning of the following: For


Examiner's
Use
(i) Local variable

(ii) Global variable

(iii) Parameter passed by value

(iv) Parameter passed by reference

[4]

(b) Explain how a stack is used to handle procedure calling and parameter passing.

[4]

© UCLES 2011 9691/31/O/N/11


www.maxpapers.com
11

9 (a) (i) Describe what happens during the lexical analysis phase of compilation. For
Examiner's
Use

[4]

(ii) Explain how syntax errors are identified during compilation.

[3]

(b) (i) Explain the value of using library routines when writing new programs.

[2]

(ii) Describe how linkers and loaders are used to make the use of library routines
possible.

[2]

© UCLES 2011 9691/31/O/N/11 [Turn over


www.maxpapers.com
12

10 A variable identifier in a certain programming language is defined in BNF (Backus-Naur For


form) as: Examiner's
Use

<non-zero-digit> ::= 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
<digit> ::= 0 | <non-zero-digit>
<letter> ::= A | B | C | x | y | z
<group> ::= <letter> | <letter><group>
<variable-identifier> ::= <non-zero-digit><group><digit> | <non-zero-digit><group>

(a) Explain why each of the following variable identifiers is invalid:

(i) 23A

(ii) 2X

(iii) 2ACB24

[3]

(b) Using only the terms:

• non-zero-digit
• digit
• letter
• variable-identifier

draw a syntax diagram to show the definition of a variable identifier.

[4]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2011 9691/31/O/N/11


www.maxpapers.com

UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS


General Certificate of Education Advanced Level
*7117681918*

COMPUTING 9691/33
Paper 3 October/November 2011
2 hours
Candidates answer on the Question Paper.
No additional materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names for software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

This document consists of 12 printed pages.

IB11 11_9691_33/4RP
© UCLES 2011 [Turn over
www.maxpapers.com
2

1 (a) State what is meant by the boot (bootstrap) program. For


Examiner's
Use

[2]

(b) Explain how the boot program is used when a PC is turned on.

[4]

© UCLES 2011 9691/33/O/N/11


www.maxpapers.com
3

2 (a) Describe the use of the Memory Data Register (MDR). For
Explain how the contents change during the fetch-execute cycle. Examiner's
Use

[3]

(b) Name three types of bus that are used in a computer. For each one explain what it is
used for.

[6]

© UCLES 2011 9691/33/O/N/11 [Turn over


www.maxpapers.com
4

3 (a) Convert the following denary numbers into 8-bit, sign and magnitude, binary numbers: For
Examiner's
Use
(i) +39

(ii) - 47

[3]

(b) Convert the following denary numbers into 8-bit, two's complement, binary numbers:

(i) - 3

[2]

(ii) - 47

[2]

© UCLES 2011 9691/33/O/N/11


www.maxpapers.com
5

(c) A particular computer uses a single 10-bit word to store a floating-point representation For
of a number. Examiner's
Use
The first 6 bits are used to store the mantissa and the remaining 4 bits are used to
store the exponent.

1
(i) Explain why 000101 0100 = 2 using this notation.
2

[2]

(ii) Rewrite the binary value of this floating-point representation so that it is in


normalised form.

[2]

(iii) 011001 0011 is a normalised floating-point number.

By converting each of the mantissa and the exponent into a denary number first,
write this number in denary.

[3]

© UCLES 2011 9691/33/O/N/11 [Turn over


www.maxpapers.com
6

4 The health system in a country consists of a number of local surgeries. Individual doctors For
give medical assistance to people in the immediate area. In addition to this there are a Examiner's
Use
number of main hospitals. Each hospital provides services which the doctors are unable to
provide in their surgeries.
The main hospitals and the surgeries which they serve are linked by using an intranet.

(a) Describe what is meant by an intranet.

[3]

(b) Explain the advantages and disadvantages of using an intranet rather than the Internet.

[5]

© UCLES 2011 9691/33/O/N/11


www.maxpapers.com
7

5 A new car is being designed. It is decided that different designs for the braking system For
should be tested using a computer simulation of each design rather than building Examiner's
Use
prototypes.

(a) Describe three advantages of using computer simulation when testing each design.

[6]

(b) Simulation allows for the braking system to be tested in different conditions.
Describe the variables in the simulation that would need to be changed in order to
replicate different driving conditions.

[5]

© UCLES 2011 9691/33/O/N/11 [Turn over


www.maxpapers.com
8

6 (a) Describe the advantages of using a relational database to store data rather than a flat For
file. Examiner's
Use

[3]

(b) Data about guests in a hotel are stored in a relational database. One part of the
database consists of a table of GUEST details. This is linked to a table ACCOUNT.
Whenever a guest orders something in the hotel, the charge for that service is stored in
the ACCOUNT table.

(i) State the primary key of the GUEST table, justifying your choice.

[2]

(ii) State a secondary key in the ACCOUNT table, justifying your choice.

[2]

(iii) State what is meant by a foreign key.

[1]

(iv) State a foreign key in the ACCOUNT table, justifying your choice.

[2]

© UCLES 2011 9691/33/O/N/11


www.maxpapers.com
9

7 (a) Explain how variables are managed during the different stages of compilation of a For
high-level language program. Examiner's
Use

[7]

(b) (i) Give two advantages of using a compiler rather than an interpreter to translate a
high-level language program.

[2]

(ii) Describe an advantage of using an interpreter rather than a compiler to translate a


high-level language program.

[2]

© UCLES 2011 9691/33/O/N/11 [Turn over


www.maxpapers.com
10

8 Explain how the following memory management techniques may be used: For
Examiner's
Use
(i) Paging

(ii) Segmentation

[6]

9 (a) State the meaning of the following types of programming paradigm:

(i) Declarative

(ii) Procedural

[2]

© UCLES 2011 9691/33/O/N/11


www.maxpapers.com
11

(b) The class diagram shows some of the information about plants on sale in a garden For
centre. Examiner's
Use

Plant

SoilType
Cost
...

getSoilType()
getCost()
...

Tree Bulb

WoodType Colour
CountryOfOrigin
...

getWoodType() getColour()
getCountryOfOrigin()
...

Use the diagram to help you explain the meaning of the terms:

(i) Class

[2]

(ii) Inheritance

[2]

(iii) Encapsulation

[2]

© UCLES 2011 9691/33/O/N/11 [Turn over


www.maxpapers.com
12

10 Workers in a factory each have an identity code which identifies their record in the For
computer system. Examiner's
Use
The identity code contains letters and numbers and is defined using BNF (Backus-Naur
form) as:

<identity-code> ::= <group> | <group><number>


<group> ::= <letter> | <letter><group>
<letter> ::= A | B | C | D
<number> ::= <digit> | <digit><digit>
<digit> ::= 0 | 1 | 2

(a) Explain why each of the following identity codes is invalid:

(i) 2BA

(ii) XAA

(iii) ACB021

[3]

(b) The definition is changed to allow only a number which begins with a 1 or a 2. The first
digit in the number is now defined as
<non-zero-digit> ::= 1 | 2
Draw a syntax diagram to show the definition of an identity code using only the terms:

• non-zero-digit
• digit
• letter
• identity-code

[4]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2011 9691/33/O/N/11

Potrebbero piacerti anche