SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS
GCE Advanced Subsidiary Level and GCE Advanced Level




MARK SCHEME for the October/November 2009 question paper
for the guidance of teachers



                                 9691 COMPUTING
        9691/12              Paper 12 (Written Paper 1), maximum raw mark 90



This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes must be read in conjunction with the question papers and the report on the
examination.



•   CIE will not enter into discussions or correspondence in connection with these mark schemes.



CIE is publishing the mark schemes for the October/November 2009 question papers for most IGCSE,
GCE Advanced Level and Advanced Subsidiary Level syllabuses and some Ordinary Level
syllabuses.




                            www.xtremepapers.net
Page 2              Mark Scheme: Teachers’ version                     Syllabus       Paper
                    GCE A/AS LEVEL – October/November 2009                  9691           12

1   (a) (i) -e.g. To transfer work from home to school/take backups of system
            -small/portable/works with any computer/stores a lot of data                          [2]

       (ii) -e.g. To import software/to make backups of data on system/encyclopaedias/films
            -large capacity/fast access times/can be used many times/re-writeable                 [2]

       (iii) -e.g. To play music while working/encyclopaedias/to import software
             -Compatible with form of albums/large storage capacity/can not be altered            [2]
             (Note: Accept any sensible application)


    (b) -hard drive
        -to store data files/software/operating systems                                           [2]
        (Note: Other storage may be justified but the question states 'need')


2   (a) (i) Software that manages the computer hardware/allows applications to run

       (ii) General purpose software/carries out a number of tasks/that would have to be done
            even if there was no computer.

       (iii) Software used to convert a program of instructions from one language to another

       (iv) Part of O.S. which carries out a commonplace task/housekeeping.
            (1 per dotty, max 4)                                                                  [4]


    (b) -Many of the processes will be dangerous...
        -many of the processes will be complex
        -and must be supervised in real time...
        -information must be immediately available
        -Small number of operators and...
        -there will be a large amount of information...
        -which must be prioritised...
        -to avoid information overload.
        -Some less important data...
        -e.g. relating to non time crucial processing
        -should be kept for later at non busy time
        -Use of priority symbols like colours/inverse video/flashing/sound alarms...
        -should be minimised because overuse causes reduction in effect.
        -Use of graphics to illustrate processes and effects of parameters on processes
        (1 per -, max 6)                                                                          [6]


3   (a) (i) The characters that a system can recognise/characters on the keyboard                 [1]

       (ii) -Each character assigned a unique binary code...
            -Known as a byte/Typically 8 bits
            -lower case/upper case in separate orders to allow alphabetic order
            -One bit reserved for parity check.
            -Meaning 128 characters can be represented
            -Extended ASCII uses all 8 bits for characters, ignoring parity
            (1 per -, max 3)                                                                      [3]




                                            © UCLES 2009


                              www.xtremepapers.net
Page 3              Mark Scheme: Teachers’ version                        Syllabus     Paper
                    GCE A/AS LEVEL – October/November 2009                     9691         12

    (b) (i) Check input to ensure it is sensible/follows set rules for data                        [1]

        (ii) -Type check/character check
                 -Ensure characters are all letters
             -Length check
                 - >1 and <20 (e.g.) characters entered
             -Existence check
                 -Compare with file to see if there is this name there
             (1 per -, max 2 pairs, max 4)                                                         [4]


    (c) 10000111
        (1 per nibble)                                                                             [2]


    (d) -Multiply 250 and 10000
        -Add 10%
        -Signify that should divide by 1024...
        -Twice
        -Answer between 2.35 and 2.75
        -M bytes
        (1 per -, max 5)                                                                           [5]


    (e) (i) -To keep track of numerical/currency values
            -and do automatic calculations
            -e.g. calculate fines/membership fees/library accounts
            (1 per -, max 2) (keep records of books/borrowers)                                     [2]

        (ii) -To create slide shows for public performance
             -Allows use of sound/video/animation/...
             -e.g. to present lessons about famous authors to parties of school children
             (1 per -, max 2)                                                                      [2]

       (iii) -To produce personalised letters/documents...
             -by searching file for data and inserting into standard document
             -e.g. Producing letters to members who have outstanding books
             (1 per -, max 2)                                                                      [2]


4   (a) (i) Advantages:
            -Hardware can be shared making system cheaper to set up
            -Software can be shared making system cheaper to set up
            -Hardware and software can be shared making it possible to provide more unusual items
            -Any machine can be used for all information
            -Software installation made easier
            -More easy to manage/control/maintain
            -communication is easy between the machines
            (1 per -, max 3)
            Disadvantages:
            -Data is not as secure as when stored on stand-alone machines
            -Can be bottlenecks when peripherals are used e.g. using a shared printer.
            (1 per -, max 1)                                                                   [4]




                                            © UCLES 2009


                              www.xtremepapers.net
Page 4              Mark Scheme: Teachers’ version                      Syllabus          Paper
                    GCE A/AS LEVEL – October/November 2009                   9691              12

       (ii) -If data being communicated is to be stored at receiver for future use, then the bit rate
            can be slow
            -If data being communicated is to be used immediately upon arrival then the bit rate
            used for communication must be faster than the rate at which the data is used.
            -bit rate is the number of bits per second                                                [2]


    (b) -Modem
        -to link LAN to communication medium
        -Gateway/Router
        -to connect two different networks together
        -Firewall
        -to protect LAN from unwanted access
        -proxy server to allow one Internet connection for whole network
        (1 per -, max 4)                                                                              [4]


5   (a) -Off-the-shelf is a generally available package
        -Custom-written is specially produced for the problem solution                                [2]


    (b) -Ready tested/Bug free
        -Immediately available
        -Training available
        -Staff who can use it are available
        -Cheaper because of shared development cost.
        -compatible with other software
        (1 per -, max 3)                                                                              [3]


6   (a) -Iteration means to repeat a series of steps
        -in a given sequence
        -The steps and the sequence are shown/it is not possible to depart from the sequence
        -The sequence can be entered at any point
        -Steps can be repeated as often as is necessary.
        (1 per -, max 3, accept answer formed around the stages on the diagram)                       [3]


    (b) -Is solution technically feasible?
             -e.g. Does the hardware exist to automatically identify a student?
        -Is the solution economic to produce?
             -e.g. Will the extra costs make the food more expensive?
        -Is the solution economic to run?/Will it cut costs in the cafeteria?
             -e.g. Will we need to employ more people, hence increasing costs?
        -What will the social implications be?
             -e.g. Will the new system cater for the disabled students?
        -Is the skill level among staff high enough?
             -e.g. Will the cafeteria staff have to do a training course?
        -Time constraints
             -e.g. The changeover must be finished by the end of a holiday
        (1 per -, max 3 pairs, max 6)                                                                 [6]




                                            © UCLES 2009


                              www.xtremepapers.net
Page 5              Mark Scheme: Teachers’ version                    Syllabus         Paper
                    GCE A/AS LEVEL – October/November 2009                 9691             12

7   (a) (i) -Card has a strip of magnetic material...
            -which holds data
            -in this case student ID number
            -Read by swiping through a card reader.
            (1 per -, max 2)

       (ii) -Is only activated by input of PIN at number pad...
            -which is stored in computer system, not on card / is stored on (one of the other two
            areas of the) magnetic stripe
            -photo ID on card
            -Ability to freeze account so items cannot be charged to it
            (1 per -, max 2)                                                                        [4]


    (b) -Staff can inspect their own data...
        -at any time...
        -in order to check its accuracy
        -Access to data limited to small/named number of people...
        -Password/Physical security
        -Data up to date and accurate
        -Data erased when no longer needed
        -Only relevant data for this example is stored.
        (1 per -, max 6)                                                                            [6]


    (c) (i) -Data is collected
            -Processing carried out at quiet time
            -Probably with no human intervention
            -Process is not time critical
            -Preparation of monthly statements
            (1 per -, max 2)                                                                        [3]

       (ii) -Real time
            -Customer requires result as soon as data has been input                                [2]


    (d) E.g.
        -Report of popular/unpopular food items...
             -provided by the cumulative totals of orders made
        -Report on times that are popular among students/staff...
             -provided by mean total takings against time
        (1 per -, max 2)                                                                            [2]




                                           © UCLES 2009


                             www.xtremepapers.net
Page 6             Mark Scheme: Teachers’ version                   Syllabus   Paper
                   GCE A/AS LEVEL – October/November 2009                9691       12

8   INPUT NO_OF_SNACK
    LET PRICE = ARRAY (NO_OF_SNACK)
    OUTPUT PRICE
    REPEAT
        INPUT COIN
        IF COIN = 1 THEN PRICE = PRICE-1
            ELSE PRICE = PRICE -5
        ENDIF
        OUTPUT PRICE
    UNTIL PRICE < = 0
    DISPENSE PRODUCT
    IF PRICE < 0 THEN REPEAT
                             DISPENSE 1 CENT COIN
                             PRICE = PRICE + 1
                      UNTIL PRICE = 0
    ENDIF
    END

    Mark Points:
    -Input snack number
    -Find price in array
    -Output Price (here AND in the first Repeat loop)
    -REPEAT... UNTIL PRICE < = 0 (or equivalent if a flow diagram Not a For)
    -Input coin (inside loop)
    -Condition of coin and then calculate price
    -Dispense Product
    -Condition for negative price
    -Loop to give change with correct condition
    -Only give 1 cent coins in change
    -Correct layout and end conditions
    (1 per -, max 9)                                                                       [9]




                                          © UCLES 2009


                             www.xtremepapers.net

Mais conteúdo relacionado

Semelhante a Nov 09 MS12

Nov 09 MS31
Nov 09 MS31Nov 09 MS31
Nov 09 MS31Samimvez
 
June 06 MS1
June 06 MS1June 06 MS1
June 06 MS1Samimvez
 
Nov 08 MS3
Nov 08 MS3Nov 08 MS3
Nov 08 MS3Samimvez
 
June 07 MS3
June 07 MS3June 07 MS3
June 07 MS3Samimvez
 
June 09 MS3
June 09 MS3June 09 MS3
June 09 MS3Samimvez
 
Nov 07 MS3
Nov 07 MS3Nov 07 MS3
Nov 07 MS3Samimvez
 
Nov 07 MS1
Nov 07 MS1Nov 07 MS1
Nov 07 MS1Samimvez
 
Nov 09 MS32
Nov 09 MS32Nov 09 MS32
Nov 09 MS32Samimvez
 
Nov 08 MS1
Nov 08 MS1Nov 08 MS1
Nov 08 MS1Samimvez
 
June 06 MS3
June 06 MS3June 06 MS3
June 06 MS3Samimvez
 
Nov 06 MS3
Nov 06 MS3Nov 06 MS3
Nov 06 MS3Samimvez
 
June 10 MS11
June 10 MS11June 10 MS11
June 10 MS11Samimvez
 
June 10 MS12
June 10 MS12June 10 MS12
June 10 MS12Samimvez
 
June 09 MS1
June 09 MS1June 09 MS1
June 09 MS1Samimvez
 
June 10 MS33
June 10 MS33June 10 MS33
June 10 MS33Samimvez
 
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1Alpro
 
Computing 9691 Mark Scheme for May / June 2007 Cambridge
Computing 9691 Mark Scheme for May / June 2007 CambridgeComputing 9691 Mark Scheme for May / June 2007 Cambridge
Computing 9691 Mark Scheme for May / June 2007 CambridgeAlpro
 
June 05 MS3
June 05 MS3June 05 MS3
June 05 MS3Samimvez
 
June 10 MS13
June 10 MS13June 10 MS13
June 10 MS13Samimvez
 
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3Alpro
 

Semelhante a Nov 09 MS12 (20)

Nov 09 MS31
Nov 09 MS31Nov 09 MS31
Nov 09 MS31
 
June 06 MS1
June 06 MS1June 06 MS1
June 06 MS1
 
Nov 08 MS3
Nov 08 MS3Nov 08 MS3
Nov 08 MS3
 
June 07 MS3
June 07 MS3June 07 MS3
June 07 MS3
 
June 09 MS3
June 09 MS3June 09 MS3
June 09 MS3
 
Nov 07 MS3
Nov 07 MS3Nov 07 MS3
Nov 07 MS3
 
Nov 07 MS1
Nov 07 MS1Nov 07 MS1
Nov 07 MS1
 
Nov 09 MS32
Nov 09 MS32Nov 09 MS32
Nov 09 MS32
 
Nov 08 MS1
Nov 08 MS1Nov 08 MS1
Nov 08 MS1
 
June 06 MS3
June 06 MS3June 06 MS3
June 06 MS3
 
Nov 06 MS3
Nov 06 MS3Nov 06 MS3
Nov 06 MS3
 
June 10 MS11
June 10 MS11June 10 MS11
June 10 MS11
 
June 10 MS12
June 10 MS12June 10 MS12
June 10 MS12
 
June 09 MS1
June 09 MS1June 09 MS1
June 09 MS1
 
June 10 MS33
June 10 MS33June 10 MS33
June 10 MS33
 
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 1
 
Computing 9691 Mark Scheme for May / June 2007 Cambridge
Computing 9691 Mark Scheme for May / June 2007 CambridgeComputing 9691 Mark Scheme for May / June 2007 Cambridge
Computing 9691 Mark Scheme for May / June 2007 Cambridge
 
June 05 MS3
June 05 MS3June 05 MS3
June 05 MS3
 
June 10 MS13
June 10 MS13June 10 MS13
June 10 MS13
 
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3
Computing 9691 Mark Scheme for May / June 2007 Cambridge Paper 3
 

Mais de Samimvez

Mais de Samimvez (20)

Sql installation tutorial
Sql installation tutorialSql installation tutorial
Sql installation tutorial
 
Example3
Example3Example3
Example3
 
Coms1010 exam paper - nov10
Coms1010   exam paper - nov10Coms1010   exam paper - nov10
Coms1010 exam paper - nov10
 
Coms1010 exam paper - may 08
Coms1010   exam paper - may 08Coms1010   exam paper - may 08
Coms1010 exam paper - may 08
 
Example2
Example2Example2
Example2
 
Labsheet 3
Labsheet 3Labsheet 3
Labsheet 3
 
Labsheet 3,5
Labsheet 3,5Labsheet 3,5
Labsheet 3,5
 
EQ V3x
EQ V3xEQ V3x
EQ V3x
 
Eq v2
Eq v2Eq v2
Eq v2
 
3.6
3.63.6
3.6
 
3.2
3.23.2
3.2
 
3.10
3.103.10
3.10
 
3.1
3.13.1
3.1
 
3.3
3.33.3
3.3
 
3.8
3.83.8
3.8
 
3.4
3.43.4
3.4
 
3.7
3.73.7
3.7
 
3.5
3.53.5
3.5
 
3.9
3.93.9
3.9
 
Nov 05 P3
Nov 05 P3Nov 05 P3
Nov 05 P3
 

Último

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Nov 09 MS12

  • 1. UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS GCE Advanced Subsidiary Level and GCE Advanced Level MARK SCHEME for the October/November 2009 question paper for the guidance of teachers 9691 COMPUTING 9691/12 Paper 12 (Written Paper 1), maximum raw mark 90 This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes must be read in conjunction with the question papers and the report on the examination. • CIE will not enter into discussions or correspondence in connection with these mark schemes. CIE is publishing the mark schemes for the October/November 2009 question papers for most IGCSE, GCE Advanced Level and Advanced Subsidiary Level syllabuses and some Ordinary Level syllabuses. www.xtremepapers.net
  • 2. Page 2 Mark Scheme: Teachers’ version Syllabus Paper GCE A/AS LEVEL – October/November 2009 9691 12 1 (a) (i) -e.g. To transfer work from home to school/take backups of system -small/portable/works with any computer/stores a lot of data [2] (ii) -e.g. To import software/to make backups of data on system/encyclopaedias/films -large capacity/fast access times/can be used many times/re-writeable [2] (iii) -e.g. To play music while working/encyclopaedias/to import software -Compatible with form of albums/large storage capacity/can not be altered [2] (Note: Accept any sensible application) (b) -hard drive -to store data files/software/operating systems [2] (Note: Other storage may be justified but the question states 'need') 2 (a) (i) Software that manages the computer hardware/allows applications to run (ii) General purpose software/carries out a number of tasks/that would have to be done even if there was no computer. (iii) Software used to convert a program of instructions from one language to another (iv) Part of O.S. which carries out a commonplace task/housekeeping. (1 per dotty, max 4) [4] (b) -Many of the processes will be dangerous... -many of the processes will be complex -and must be supervised in real time... -information must be immediately available -Small number of operators and... -there will be a large amount of information... -which must be prioritised... -to avoid information overload. -Some less important data... -e.g. relating to non time crucial processing -should be kept for later at non busy time -Use of priority symbols like colours/inverse video/flashing/sound alarms... -should be minimised because overuse causes reduction in effect. -Use of graphics to illustrate processes and effects of parameters on processes (1 per -, max 6) [6] 3 (a) (i) The characters that a system can recognise/characters on the keyboard [1] (ii) -Each character assigned a unique binary code... -Known as a byte/Typically 8 bits -lower case/upper case in separate orders to allow alphabetic order -One bit reserved for parity check. -Meaning 128 characters can be represented -Extended ASCII uses all 8 bits for characters, ignoring parity (1 per -, max 3) [3] © UCLES 2009 www.xtremepapers.net
  • 3. Page 3 Mark Scheme: Teachers’ version Syllabus Paper GCE A/AS LEVEL – October/November 2009 9691 12 (b) (i) Check input to ensure it is sensible/follows set rules for data [1] (ii) -Type check/character check -Ensure characters are all letters -Length check - >1 and <20 (e.g.) characters entered -Existence check -Compare with file to see if there is this name there (1 per -, max 2 pairs, max 4) [4] (c) 10000111 (1 per nibble) [2] (d) -Multiply 250 and 10000 -Add 10% -Signify that should divide by 1024... -Twice -Answer between 2.35 and 2.75 -M bytes (1 per -, max 5) [5] (e) (i) -To keep track of numerical/currency values -and do automatic calculations -e.g. calculate fines/membership fees/library accounts (1 per -, max 2) (keep records of books/borrowers) [2] (ii) -To create slide shows for public performance -Allows use of sound/video/animation/... -e.g. to present lessons about famous authors to parties of school children (1 per -, max 2) [2] (iii) -To produce personalised letters/documents... -by searching file for data and inserting into standard document -e.g. Producing letters to members who have outstanding books (1 per -, max 2) [2] 4 (a) (i) Advantages: -Hardware can be shared making system cheaper to set up -Software can be shared making system cheaper to set up -Hardware and software can be shared making it possible to provide more unusual items -Any machine can be used for all information -Software installation made easier -More easy to manage/control/maintain -communication is easy between the machines (1 per -, max 3) Disadvantages: -Data is not as secure as when stored on stand-alone machines -Can be bottlenecks when peripherals are used e.g. using a shared printer. (1 per -, max 1) [4] © UCLES 2009 www.xtremepapers.net
  • 4. Page 4 Mark Scheme: Teachers’ version Syllabus Paper GCE A/AS LEVEL – October/November 2009 9691 12 (ii) -If data being communicated is to be stored at receiver for future use, then the bit rate can be slow -If data being communicated is to be used immediately upon arrival then the bit rate used for communication must be faster than the rate at which the data is used. -bit rate is the number of bits per second [2] (b) -Modem -to link LAN to communication medium -Gateway/Router -to connect two different networks together -Firewall -to protect LAN from unwanted access -proxy server to allow one Internet connection for whole network (1 per -, max 4) [4] 5 (a) -Off-the-shelf is a generally available package -Custom-written is specially produced for the problem solution [2] (b) -Ready tested/Bug free -Immediately available -Training available -Staff who can use it are available -Cheaper because of shared development cost. -compatible with other software (1 per -, max 3) [3] 6 (a) -Iteration means to repeat a series of steps -in a given sequence -The steps and the sequence are shown/it is not possible to depart from the sequence -The sequence can be entered at any point -Steps can be repeated as often as is necessary. (1 per -, max 3, accept answer formed around the stages on the diagram) [3] (b) -Is solution technically feasible? -e.g. Does the hardware exist to automatically identify a student? -Is the solution economic to produce? -e.g. Will the extra costs make the food more expensive? -Is the solution economic to run?/Will it cut costs in the cafeteria? -e.g. Will we need to employ more people, hence increasing costs? -What will the social implications be? -e.g. Will the new system cater for the disabled students? -Is the skill level among staff high enough? -e.g. Will the cafeteria staff have to do a training course? -Time constraints -e.g. The changeover must be finished by the end of a holiday (1 per -, max 3 pairs, max 6) [6] © UCLES 2009 www.xtremepapers.net
  • 5. Page 5 Mark Scheme: Teachers’ version Syllabus Paper GCE A/AS LEVEL – October/November 2009 9691 12 7 (a) (i) -Card has a strip of magnetic material... -which holds data -in this case student ID number -Read by swiping through a card reader. (1 per -, max 2) (ii) -Is only activated by input of PIN at number pad... -which is stored in computer system, not on card / is stored on (one of the other two areas of the) magnetic stripe -photo ID on card -Ability to freeze account so items cannot be charged to it (1 per -, max 2) [4] (b) -Staff can inspect their own data... -at any time... -in order to check its accuracy -Access to data limited to small/named number of people... -Password/Physical security -Data up to date and accurate -Data erased when no longer needed -Only relevant data for this example is stored. (1 per -, max 6) [6] (c) (i) -Data is collected -Processing carried out at quiet time -Probably with no human intervention -Process is not time critical -Preparation of monthly statements (1 per -, max 2) [3] (ii) -Real time -Customer requires result as soon as data has been input [2] (d) E.g. -Report of popular/unpopular food items... -provided by the cumulative totals of orders made -Report on times that are popular among students/staff... -provided by mean total takings against time (1 per -, max 2) [2] © UCLES 2009 www.xtremepapers.net
  • 6. Page 6 Mark Scheme: Teachers’ version Syllabus Paper GCE A/AS LEVEL – October/November 2009 9691 12 8 INPUT NO_OF_SNACK LET PRICE = ARRAY (NO_OF_SNACK) OUTPUT PRICE REPEAT INPUT COIN IF COIN = 1 THEN PRICE = PRICE-1 ELSE PRICE = PRICE -5 ENDIF OUTPUT PRICE UNTIL PRICE < = 0 DISPENSE PRODUCT IF PRICE < 0 THEN REPEAT DISPENSE 1 CENT COIN PRICE = PRICE + 1 UNTIL PRICE = 0 ENDIF END Mark Points: -Input snack number -Find price in array -Output Price (here AND in the first Repeat loop) -REPEAT... UNTIL PRICE < = 0 (or equivalent if a flow diagram Not a For) -Input coin (inside loop) -Condition of coin and then calculate price -Dispense Product -Condition for negative price -Loop to give change with correct condition -Only give 1 cent coins in change -Correct layout and end conditions (1 per -, max 9) [9] © UCLES 2009 www.xtremepapers.net