Cambridge International AS & A Level: Computer Science 9618/12
Cambridge International AS & A Level: Computer Science 9618/12
* 0 1 3 3 1 4 9 7 0 1 *
1 hour 30 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (DE/FC) 318301/3
© UCLES 2023 [Turn over
2
The factory uses a conveyor belt that moves the products from one stage of production to the next
stage.
(a) An automated system counts the number of chocolate bars made at the end of production.
............................................................................................................................................. [1]
(b) A second automated system removes chocolate bars with an incorrect weight from the
production line.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) The factory has many different machines with embedded systems.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
...........................................................................................................................................
..................................................................................................................................... [1]
BLANK PAGE
2 (a) State what is meant by the following terms in a relational database model.
Entity .........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
(b) Authentication is one method a Database Management System (DBMS) can use to improve
the security of a database.
Describe other methods that a DBMS can use to improve the security of a database.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Explain how to modify the table to put it into First Normal Form (1NF).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
...................................................................................................................................................
............................................................................................................................................. [1]
(b) (i) Convert the denary value into a 12-bit two’s complement binary integer.
−196
100001100101
000111010110
(c) Identify one practical application of BCD and justify why BCD is used in this application.
Application ................................................................................................................................
...................................................................................................................................................
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
4 (a) Write the Boolean expression that corresponds to the following logic circuit.
A
B
X
...................................................................................................................................................
............................................................................................................................................. [3]
A B C Working space X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[2]
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Spyware ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
Tick (✓) one box to identify the most appropriate type of compression and justify your answer.
Lossy Lossless
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Explain the impact of changing the sampling resolution on the accuracy of a sound recording.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) A bitmap image has a resolution of 2048 pixels wide and 1024 pixels high.
Estimate the file size of the bitmap image in mebibytes. Show your working.
Working .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
• a router
• two laptop computers
• a server.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
[2]
(ii) Explain how data is transmitted between the two laptops in the LAN.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
(c) State three tasks performed by devices to deal with collisions when using the Carrier Sense
Multiple Access / Collision Detection (CSMA/CD) protocol in a network.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(d) The following incomplete table contains types of IP addresses and their descriptions.
Complete the table by writing the missing types of IP addresses and the missing descriptions.
................................................................
................................................................
static IP address
................................................................
................................................................
................................................................
................................................................
dynamic IP address
................................................................
................................................................
[4]
...................................................................................................................................................
............................................................................................................................................. [1]
Identify one example of utility software that is not intended to improve security.
Explanation ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
(i) Give the name of one port that can provide a connection for the optical disc reader/writer.
..................................................................................................................................... [1]
(ii) Describe the roles of the address bus, the data bus and buffers in the process of writing
data to the optical disc reader/writer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
9 The following table shows part of the instruction set for a processor. The processor has two
registers, the Accumulator (ACC) and the Index Register (IX).
Instruction
Explanation
Opcode Operand
Direct addressing. Load the contents of the location at the given
LDD <address>
address to ACC
Indexed addressing. Form the address from <address> +
LDX <address> the contents of the index register. Copy the contents of this
calculated address to ACC
LDR #n Immediate addressing. Load the number n to IX
STO <address> Store the contents of ACC at the given address
ADD #n Add the denary number n to the ACC
JMP <address> Jump to the given address
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP <address> Compare the contents of ACC with the contents of <address>
Indirect addressing. The address to be used is at the given
CMI <address> address. Compare the contents of ACC with the contents of this
second address
Following a compare instruction, jump to <address> if the
JPE <address>
compare was True
IN Key in a character and store its ASCII value in ACC
Output to the screen the character whose ASCII value is stored
OUT
in ACC
END Return control to the operating system
<address> can be an absolute or a symbolic address
# denotes a denary number, e.g. #123
(a) The instructions in the processor’s instruction set can be grouped according to their function.
IN ..............................................................................................................................................
ADD ............................................................................................................................................
JPE ............................................................................................................................................
CMI ............................................................................................................................................
[4]
(b) The current contents of main memory and selected values from the ASCII character set are
given on page 15.
Trace the program currently in memory using the trace table when the input is ‘1’.
...
100 0
101 0
...
110 51
111 65
ASCII
Character
value
49 1
50 2
51 3
[4]
52 4
...
65 A
66 B
67 C
68 D
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.