Cambridge International AS & A Level: Computer Science 9608/12
Cambridge International AS & A Level: Computer Science 9608/12
Cambridge International AS & A Level: Computer Science 9608/12
* 2 0 8 0 1 2 7 1 9 5 *
1 hour 30 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (PQ) 205100/3
© UCLES 2021 [Turn over
2
1 A computer has Random Access Memory (RAM) and Read Only Memory (ROM).
Tick (✓) one or more boxes in each row to identify whether each statement refers to RAM, ROM
or both.
It is volatile
Bitmap Logo
R R R R R R R R
R B B B B B W R
R B W W W B W R
R B W W W W W R
R B W W B B W R
R B W W W B W R
R B B B B B W R
R R R R R R R R
(i) State the minimum number of bits needed to represent each pixel in the bitmap logo.
..................................................................................................................................... [1]
(ii) Calculate the minimum file size, in bytes, of the bitmap logo. Show your working.
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(b) The travel company uploads a video to its website. The video is stored as an MP4 file. MP4 is
an example of a multimedia container format.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) Complete the following sentences that describe two terms related to videos.
3 Upali travels for his work and uses his mobile phone to access the World Wide Web (WWW) and
to communicate with his office by email. His office has a fixed connection to the Internet.
(a) Identify two types of communication systems that support the transmission of his data.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Upali connects his computer to the Local Area Network (LAN) when he is in the office.
The network uses both copper cables and fibre optic cables.
Identify two other examples of network hardware that can be used in a LAN.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(c) Checksum is one method used for verification of transmitted data within a network.
Method ......................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
(d) Upali works for a company that stores data on a web server.
Describe two security measures that can be used to protect a web server from unauthorised
access.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
4 The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Op Explanation
Operand
Code
SUB <address> Subtract the contents of the given address from the ACC
DEC <register> Subtract 1 from the contents of the register (ACC or IX)
(a) The instructions in the processor’s instruction set can be grouped according to their function.
(i) Identify three different instruction groups from the instructions given in the table.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
..................................................................................................................................... [1]
(b) The following are four special purpose registers used in the processor:
Describe the purpose of any three registers from the four given.
Register 1 .................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Register 2 .................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Register 3 .................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
5 Jackie is writing a program in a high-level language (HLL). The program makes use of Dynamic
Link Library (DLL) files.
(a) Complete the following sentences about DLL files by writing the missing words from the list
given below.
calling program.
One drawback of a DLL file is that the main program could stop working if the DLL file is
....................................... .
[4]
(b) Jackie will use language translation software to run her HLL program.
Translator ..................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(c) Explain the reasons why Jackie should copyright her program.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Defragmenter ...................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
8 An employment agency keeps records of its contracts with employers and workers in a relational
database.
CONTRACT_TYPE(ConTypeId, ConName)
(a) Complete the entity-relationship (E-R) diagram for this part of the database.
EMPLOYER WORKER
CONTRACT_TYPE CONTRACT
[3]
(b) Write a Data Definition Language (DDL) statement to change the CONTRACT table to remove
the attribute RefConNumber.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) The following table has examples of DDL and Data Manipulation Language (DML) statements.
Tick (✓) one box in each row to identify whether each statement is an example of DML or
DDL.
ALTER TABLE
SELECT FROM
INNER JOIN
CREATE DATABASE
[2]
(d) The field WkPhoneNumber cannot be empty and must have a maximum of 14 characters.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Describe the basic internal layout and operation of a magnetic hard disk drive.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
9 The sequence of operations shows, in register transfer notation, the fetch stage of the
fetch-execute cycle.
1 MAR ← [PC]
2 PC ← [PC] + 1
3 MDR ← [[MAR]]
4 CIR ← [MDR]
Write a description of each of the three register transfer notations given in the following table.
.......................................................................................................
MAR ← [PC]
.......................................................................................................
.......................................................................................................
PC ← [PC] + 1
.......................................................................................................
.......................................................................................................
MDR ← [[MAR]]
.......................................................................................................
[3]
(a) State the number of different values that an 8-bit unsigned binary integer can represent.
............................................................................................................................................. [1]
(b) Give the smallest and largest denary values that an 8-bit two’s complement integer can
represent.
Smallest ....................................................................................................................................
Largest ......................................................................................................................................
[2]
BLANK PAGE
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.