SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS
                            General Certificate of Education
                     Advanced Subsidiary Level and Advanced Level

         COMPUTING
         Paper 3
                                                                        October/November 2005

                                                                                               2 hours
         Additional Materials:   Answer Booklet/Paper




  READ THESE INSTRUCTIONS FIRST

  If you have been given an Answer Booklet, follow the instructions on the front cover of the Booklet.
  Write in dark blue or black pen on both sides of the paper.
  You may use a soft pencil for any diagrams, graphs, music or rough working.
  Do not use staples, paper clips, highlighters, glue or correction fluid.

  Answer all questions.
  At the end of the examination, fasten all your work securely together.
  The number of marks is given in brackets [ ] at the end of each question or part question.




                                  This document consists of 4 printed pages.
IB05 11_9691_03/2RP
 UCLES 2005                                                                                        [Turn over



                                 www.xtremepapers.net
2

1   (a) Explain what is meant by a flat file.                                                        [2]


    (b) Describe three advantages of using a relational database over flat files.                    [6]


2   (a) Explain what is meant by each of the following types of addressing of memory.

         (i) Indirect addressing.                                                                    [3]

        (ii) Indexed addressing.                                                                     [3]


    (b) Explain under what circumstances

         (i) indirect addressing,

        (ii) indexed addressing

         are useful in low level language processing.                                                [4]


3   A robotic vehicle is designed to keep the floor of a factory clean. It is equipped with a ‘map’ of
    where things are on the floor of the factory, and an algorithm that instructs it where to go next.

    (a) State two problems that may arise which are not covered by the ‘map’ of the factory floor. [2]


    (b) Describe the input and output hardware necessary for the vehicle to be able to move safely.
                                                                                                [6]


4   A processor is to carry out the instruction ADD 200. This instruction means that the contents of
    memory location 200 should be added to the accumulator.

    Describe the steps of the fetch-execute cycle, stating the effect on the registers in the processor,
    when carrying out this instruction.                                                              [8]


5   (a) State the purpose of an interrupt in a computer system.                                      [1]


    (b) Describe what is meant by a

         (i) timer interrupt,

        (ii) hardware interrupt.                                                                     [4]


    (c) Explain the role of

         (i) linkers,

        (ii) loaders

         in the running of programs                                                                  [4]


© UCLES 2005                                    9691/03/O/N/05



                                www.xtremepapers.net
3

6   (a) Explain the difference between static and dynamic data structures.                             [2]


    (b) Give an example of a

         (i) static,

        (ii) dynamic

         data structure, giving an advantage of each.                                                  [4]


    (c) The details of a car part are stored in a binary tree according to this algorithm

         READ VALUE NEW_PART
         START AT ROOT NODE
         WHILE NODE NOT EMPTY, DO
            IF NEW_PART < VALUE AT NODE
                  THEN FOLLOW LEFT SUBTREE
                  ELSE FOLLOW RIGHT SUBTREE
            ENDIF
         ENDWHILE
         INSERT NEW_PART AT NODE
         END

         (i) Show the binary tree after the following values have been input

               Radio       Visor     Brakes       Tyres        Alternator   Windscreen                 [3]

        (ii) Explain how Clutch is added to the tree in (i).                                           [5]

        (iii) Describe an algorithm that can be applied to the binary tree of car parts, so that the tree
              is read in alphabetic order.                                                             [3]


7   (a) Some messages which are passed on a network are confidential.

         State the meanings of the terms

         (i) encryption,

        (ii) message authentication

         and explain how they are used to maintain confidentiality of messages.                        [6]


    (b) (i) Explain how

               (I) partitioning,

               (II) duplication

               may be used to distribute data on a network.                                            [2]

        (ii) Explain the implications, to both the data and the network manager, of duplicating the
             data.                                                                               [4]


© UCLES 2005                                  9691/03/O/N/05                                  [Turn over


                                   www.xtremepapers.net
4

8     A systems analyst is employed to produce a new computer system for a large business.

      The analyst is able to use a number of software tools to help in the work.

      One software tool allows for the production of Gantt charts.

      (a) Describe the features of a software tool to produce Gantt charts.                                                                             [4]


      (b) Identify and describe the features of one other software tool that can be used during the
          development of a new system.                                                           [4]


9     A national company designs, manufactures and fits kitchen furniture.

      Before the company computerised their systems, a typical commission would be

      •      Customer sees an advert in a magazine and calls the firm to arrange for a home visit

      •      A sales representative travels in to a regional office to collect the appointments for the day

      •      The sales representative delivers plans created for other customers

      •      A number of appointments would be held at the customer’s house. Each time the
             representative would go away to draw up plans and a likeness of what the finished kitchen
             will look like

      •      When the customer is in agreement with the plans, the representative takes the plans in to
             the office

      •      The plans are sent to the factory where the units would be made according to stock
             availability

      •      After the kitchen is fitted an invoice is sent to the customer

      Discuss how computerisation will affect the business.                                                                                           [10]




Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

University of Cambridge International Examinations is part of the University of Cambridge Local Examinations Syndicate (UCLES), which is itself a department
of the University of Cambridge.

© UCLES 2005                                                         9691/03/O/N/05



                                              www.xtremepapers.net

Mais conteúdo relacionado

Mais procurados

June 04 P3
June 04 P3June 04 P3
June 04 P3Samimvez
 
June 07 P3
June 07 P3June 07 P3
June 07 P3Samimvez
 
Nov 09 P11
Nov 09 P11Nov 09 P11
Nov 09 P11Samimvez
 
June 04 P31
June 04 P31June 04 P31
June 04 P31Samimvez
 
June 09 P1
June 09 P1June 09 P1
June 09 P1Samimvez
 
June 09 P3
June 09 P3June 09 P3
June 09 P3Samimvez
 
Nov 04 MS3
Nov 04 MS3Nov 04 MS3
Nov 04 MS3Samimvez
 
June 02 P1
June 02 P1June 02 P1
June 02 P1Samimvez
 
June 08 P1
June 08 P1June 08 P1
June 08 P1Samimvez
 
Nov 06 MS3
Nov 06 MS3Nov 06 MS3
Nov 06 MS3Samimvez
 
C O M P U T E R O R G A N I Z A T I O N J N T U M O D E L P A P E R{Www
C O M P U T E R  O R G A N I Z A T I O N  J N T U  M O D E L  P A P E R{WwwC O M P U T E R  O R G A N I Z A T I O N  J N T U  M O D E L  P A P E R{Www
C O M P U T E R O R G A N I Z A T I O N J N T U M O D E L P A P E R{Wwwguest3f9c6b
 
nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)ijceronline
 

Mais procurados (13)

June 04 P3
June 04 P3June 04 P3
June 04 P3
 
Nov 02 P1
Nov 02 P1Nov 02 P1
Nov 02 P1
 
June 07 P3
June 07 P3June 07 P3
June 07 P3
 
Nov 09 P11
Nov 09 P11Nov 09 P11
Nov 09 P11
 
June 04 P31
June 04 P31June 04 P31
June 04 P31
 
June 09 P1
June 09 P1June 09 P1
June 09 P1
 
June 09 P3
June 09 P3June 09 P3
June 09 P3
 
Nov 04 MS3
Nov 04 MS3Nov 04 MS3
Nov 04 MS3
 
June 02 P1
June 02 P1June 02 P1
June 02 P1
 
June 08 P1
June 08 P1June 08 P1
June 08 P1
 
Nov 06 MS3
Nov 06 MS3Nov 06 MS3
Nov 06 MS3
 
C O M P U T E R O R G A N I Z A T I O N J N T U M O D E L P A P E R{Www
C O M P U T E R  O R G A N I Z A T I O N  J N T U  M O D E L  P A P E R{WwwC O M P U T E R  O R G A N I Z A T I O N  J N T U  M O D E L  P A P E R{Www
C O M P U T E R O R G A N I Z A T I O N J N T U M O D E L P A P E R{Www
 
nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)
 

Semelhante a Nov 05 P3

June 06 P1
June 06 P1June 06 P1
June 06 P1Samimvez
 
Nov 09 P31
Nov 09 P31Nov 09 P31
Nov 09 P31Samimvez
 
June 06 P3
June 06 P3June 06 P3
June 06 P3Samimvez
 
June 07 P1
June 07 P1June 07 P1
June 07 P1Samimvez
 
Nov 09 P12
Nov 09 P12Nov 09 P12
Nov 09 P12Samimvez
 
June 03 P1
June 03 P1June 03 P1
June 03 P1Samimvez
 
Computer paper 3 may june 2008 9691 cambridge General Certificate of educatio...
Computer paper 3 may june 2008 9691 cambridge General Certificate of educatio...Computer paper 3 may june 2008 9691 cambridge General Certificate of educatio...
Computer paper 3 may june 2008 9691 cambridge General Certificate of educatio...Alpro
 
June 10 P11
June 10 P11June 10 P11
June 10 P11Samimvez
 
June 05 P3
June 05 P3June 05 P3
June 05 P3Samimvez
 
June 10 P12
June 10 P12June 10 P12
June 10 P12Samimvez
 
Computing 9691 Test Paper Paper 3 for May / June 2007 Cambridge
Computing 9691 Test Paper Paper 3 for May / June 2007 CambridgeComputing 9691 Test Paper Paper 3 for May / June 2007 Cambridge
Computing 9691 Test Paper Paper 3 for May / June 2007 CambridgeAlpro
 

Semelhante a Nov 05 P3 (20)

Nov 05 P1
Nov 05 P1Nov 05 P1
Nov 05 P1
 
Nov 04 P1
Nov 04 P1Nov 04 P1
Nov 04 P1
 
Nov 08 P1
Nov 08 P1Nov 08 P1
Nov 08 P1
 
Nov 07 P1
Nov 07 P1Nov 07 P1
Nov 07 P1
 
June 06 P1
June 06 P1June 06 P1
June 06 P1
 
Nov 09 P31
Nov 09 P31Nov 09 P31
Nov 09 P31
 
June 06 P3
June 06 P3June 06 P3
June 06 P3
 
June 07 P1
June 07 P1June 07 P1
June 07 P1
 
Nov 09 P12
Nov 09 P12Nov 09 P12
Nov 09 P12
 
Nov 03 P1
Nov 03 P1Nov 03 P1
Nov 03 P1
 
June 03 P1
June 03 P1June 03 P1
June 03 P1
 
Nov 08 P3
Nov 08 P3Nov 08 P3
Nov 08 P3
 
Nov 03 P3
Nov 03 P3Nov 03 P3
Nov 03 P3
 
Nov 07 P3
Nov 07 P3Nov 07 P3
Nov 07 P3
 
Nov 04 P3
Nov 04 P3Nov 04 P3
Nov 04 P3
 
Computer paper 3 may june 2008 9691 cambridge General Certificate of educatio...
Computer paper 3 may june 2008 9691 cambridge General Certificate of educatio...Computer paper 3 may june 2008 9691 cambridge General Certificate of educatio...
Computer paper 3 may june 2008 9691 cambridge General Certificate of educatio...
 
June 10 P11
June 10 P11June 10 P11
June 10 P11
 
June 05 P3
June 05 P3June 05 P3
June 05 P3
 
June 10 P12
June 10 P12June 10 P12
June 10 P12
 
Computing 9691 Test Paper Paper 3 for May / June 2007 Cambridge
Computing 9691 Test Paper Paper 3 for May / June 2007 CambridgeComputing 9691 Test Paper Paper 3 for May / June 2007 Cambridge
Computing 9691 Test Paper Paper 3 for May / June 2007 Cambridge
 

Mais de Samimvez

Mais de Samimvez (20)

Sql installation tutorial
Sql installation tutorialSql installation tutorial
Sql installation tutorial
 
Example3
Example3Example3
Example3
 
Coms1010 exam paper - nov10
Coms1010   exam paper - nov10Coms1010   exam paper - nov10
Coms1010 exam paper - nov10
 
Coms1010 exam paper - may 08
Coms1010   exam paper - may 08Coms1010   exam paper - may 08
Coms1010 exam paper - may 08
 
Example2
Example2Example2
Example2
 
Labsheet 3
Labsheet 3Labsheet 3
Labsheet 3
 
Labsheet 3,5
Labsheet 3,5Labsheet 3,5
Labsheet 3,5
 
EQ V3x
EQ V3xEQ V3x
EQ V3x
 
Eq v2
Eq v2Eq v2
Eq v2
 
3.6
3.63.6
3.6
 
3.2
3.23.2
3.2
 
3.10
3.103.10
3.10
 
3.1
3.13.1
3.1
 
3.3
3.33.3
3.3
 
3.8
3.83.8
3.8
 
3.4
3.43.4
3.4
 
3.7
3.73.7
3.7
 
3.5
3.53.5
3.5
 
3.9
3.93.9
3.9
 
June 02 MS2
June 02 MS2June 02 MS2
June 02 MS2
 

Último

Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 

Último (20)

Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 

Nov 05 P3

  • 1. UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS General Certificate of Education Advanced Subsidiary Level and Advanced Level COMPUTING Paper 3 October/November 2005 2 hours Additional Materials: Answer Booklet/Paper READ THESE INSTRUCTIONS FIRST If you have been given an Answer Booklet, follow the instructions on the front cover of the Booklet. Write in dark blue or black pen on both sides of the paper. You may use a soft pencil for any diagrams, graphs, music or rough working. Do not use staples, paper clips, highlighters, glue or correction fluid. Answer all questions. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. This document consists of 4 printed pages. IB05 11_9691_03/2RP  UCLES 2005 [Turn over www.xtremepapers.net
  • 2. 2 1 (a) Explain what is meant by a flat file. [2] (b) Describe three advantages of using a relational database over flat files. [6] 2 (a) Explain what is meant by each of the following types of addressing of memory. (i) Indirect addressing. [3] (ii) Indexed addressing. [3] (b) Explain under what circumstances (i) indirect addressing, (ii) indexed addressing are useful in low level language processing. [4] 3 A robotic vehicle is designed to keep the floor of a factory clean. It is equipped with a ‘map’ of where things are on the floor of the factory, and an algorithm that instructs it where to go next. (a) State two problems that may arise which are not covered by the ‘map’ of the factory floor. [2] (b) Describe the input and output hardware necessary for the vehicle to be able to move safely. [6] 4 A processor is to carry out the instruction ADD 200. This instruction means that the contents of memory location 200 should be added to the accumulator. Describe the steps of the fetch-execute cycle, stating the effect on the registers in the processor, when carrying out this instruction. [8] 5 (a) State the purpose of an interrupt in a computer system. [1] (b) Describe what is meant by a (i) timer interrupt, (ii) hardware interrupt. [4] (c) Explain the role of (i) linkers, (ii) loaders in the running of programs [4] © UCLES 2005 9691/03/O/N/05 www.xtremepapers.net
  • 3. 3 6 (a) Explain the difference between static and dynamic data structures. [2] (b) Give an example of a (i) static, (ii) dynamic data structure, giving an advantage of each. [4] (c) The details of a car part are stored in a binary tree according to this algorithm READ VALUE NEW_PART START AT ROOT NODE WHILE NODE NOT EMPTY, DO IF NEW_PART < VALUE AT NODE THEN FOLLOW LEFT SUBTREE ELSE FOLLOW RIGHT SUBTREE ENDIF ENDWHILE INSERT NEW_PART AT NODE END (i) Show the binary tree after the following values have been input Radio Visor Brakes Tyres Alternator Windscreen [3] (ii) Explain how Clutch is added to the tree in (i). [5] (iii) Describe an algorithm that can be applied to the binary tree of car parts, so that the tree is read in alphabetic order. [3] 7 (a) Some messages which are passed on a network are confidential. State the meanings of the terms (i) encryption, (ii) message authentication and explain how they are used to maintain confidentiality of messages. [6] (b) (i) Explain how (I) partitioning, (II) duplication may be used to distribute data on a network. [2] (ii) Explain the implications, to both the data and the network manager, of duplicating the data. [4] © UCLES 2005 9691/03/O/N/05 [Turn over www.xtremepapers.net
  • 4. 4 8 A systems analyst is employed to produce a new computer system for a large business. The analyst is able to use a number of software tools to help in the work. One software tool allows for the production of Gantt charts. (a) Describe the features of a software tool to produce Gantt charts. [4] (b) Identify and describe the features of one other software tool that can be used during the development of a new system. [4] 9 A national company designs, manufactures and fits kitchen furniture. Before the company computerised their systems, a typical commission would be • Customer sees an advert in a magazine and calls the firm to arrange for a home visit • A sales representative travels in to a regional office to collect the appointments for the day • The sales representative delivers plans created for other customers • A number of appointments would be held at the customer’s house. Each time the representative would go away to draw up plans and a likeness of what the finished kitchen will look like • When the customer is in agreement with the plans, the representative takes the plans in to the office • The plans are sent to the factory where the units would be made according to stock availability • After the kitchen is fitted an invoice is sent to the customer Discuss how computerisation will affect the business. [10] Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. University of Cambridge International Examinations is part of the University of Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge. © UCLES 2005 9691/03/O/N/05 www.xtremepapers.net