SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS
                               General Certificate of Education
                               Advanced Subsidiary Level and Advanced Level



               COMPUTING                                                                                              9691/12
               Paper 1                                                                             October/November 2009
                                                                                                        2 hours 30 minutes
               Additional Materials:     Answer Booklet/Paper
*9022551224*




               READ THESE INSTRUCTIONS FIRST

               If you have been given an Answer Booklet, follow the instructions on the front cover of the Booklet.
               Write your Centre number, candidate number and name on all the work you hand in.
               Write in dark blue or black pen.
               You may use a soft pencil for any diagrams, graphs or rough working.
               Do not use staples, paper clips, highlighters, glue or correction fluid.

               Answer all questions.

               At the end of the examination, fasten all your work securely together.
               The number of marks is given in brackets [ ] at the end of each question or part question.




                                       This document consists of 5 printed pages and 3 blank pages.

               IB09 11_9691_12/3RP
               © UCLES 2009                                                                                       [Turn over




                                               www.xtremepapers.net
2

1   A student has a stand-alone computer at home and also uses the computers at school. She uses
    a USB stick, a DVD-RW drive and a CD-ROM drive on her home computer.

    (a) State a use that the student could make of each of the following, justifying your choices.

         (i) USB stick                                                                               [2]

         (ii) DVD-RW drive                                                                           [2]

         (iii) CD-ROM drive.                                                                         [2]

    (b) State one other storage device that the student would need at home and say why it would be
        needed.                                                                                 [2]


2   (a) Define the following types of software:

         (i) operating system software,

         (ii) generic applications software,

         (iii) translator software,

         (iv) utility software.                                                                      [4]

    (b) A computer system is based in a chemical factory. The chemical processes are all
        automatically controlled by the computer system which is operated from a central point.

         Discuss why it is important to have a good interface design on the system.                  [6]




© UCLES 2009                                   9691/12/O/N/09



                                  www.xtremepapers.net
3

3   A library stores details of members on the member file.

    (a) Members’ names are stored as strings of characters using ASCII.

         (i) State what is meant by a character set.                                                 [1]

         (ii) Describe how the ASCII character set is represented.                                   [3]

    (b) When a member's name is input to the system it needs to be validated.

         (i) State what is meant by validation.                                                      [1]

         (ii) Describe two validation checks that can be carried out when a member's name is input
              to the system.                                                                   [4]

    (c) The number of visits made by a member during the year is stored as an integer in a single
        byte. Mr Jyu has visited 135 times.

         Change 135 into the binary representation for the computer to store.                        [2]

    (d) The member file contains up to 10,000 records. The estimated size of each record is 250
        bytes.

         Estimate the size of the member file using appropriate units. (Show your working.)          [5]

    (e) Describe how the following types of software can be used in the library:

         (i) spreadsheet,                                                                            [2]

         (ii) presentation software,                                                                 [2]

         (iii) mail-merge software.                                                                  [2]


4   (a) A medical centre has a number of stand-alone computers. It is decided that these should be
        linked in a LAN.

         (i) State three advantages and one disadvantage of networking the computers.                [4]

         (ii) Explain the relationship between bit rates and the use of data content in a network.   [2]

    (b) Describe the additional hardware required when a LAN is connected to a WAN.                  [4]




© UCLES 2009                                  9691/12/O/N/09                                  [Turn over


                               www.xtremepapers.net
4

The remaining questions refer to the following information.

A large college has a cafeteria and an automated snack bar. Only staff and students of the college
are allowed to purchase food and drink there.


5   The college decides to computerise the accounts of the cafeteria. The manager needs to decide
    between using off-the-shelf software or custom-written software.

    (a) Explain the difference between off-the-shelf and custom-written software.                     [2]

    (b) State three advantages of using off-the-shelf software in this situation.                     [3]


6   It is decided to employ a systems analyst to produce the new computer system. The analyst
    follows the system life cycle.

    (a)


          Identification
           of problem
                      Feasibility study

                          Information collection

                                Analysis of problem

                                          Design of system

                                                   Development and
                                                          Testing
                                                                     Implementation
                                                                             Maintenance
                                                                                       Obsolescence


           The system life cycle is shown in the diagram. Explain why the cycle is considered to be an
           iterative process.                                                                       [3]

    (b) Describe how three parts of the feasibility study, carried out by the analyst, relate to the
        cafeteria and automated snack bar.                                                        [6]




© UCLES 2009                                        9691/12/O/N/09



                                   www.xtremepapers.net
5

7   Staff and students who buy food are identified by the system. Their purchases are charged to
    their accounts. These accounts are paid off at the end of each term.

    (a) Each student carries a magnetic stripe card to use with the system.

         (i) Describe how such a card works.                                                      [2]

         (ii) State two safeguards against improper use if it is stolen.                          [2]

    (b) Some members of staff are worried that their information may be misused. Data protection
        legislation is used to protect personal data.

         Describe the features of such legislation.                                               [6]

    (c) The total value of the goods which a person has bought is shown at a checkout. Each person
        is given a statement, informing them what they currently owe, at the end of each month.

         (i) Explain what is meant by a batch operating system and state which of the two processes
             would be carried out by a batch operating system.                                   [3]

         (ii) State a type of operating system which could be used for the other process described
              and justify your choice.                                                          [2]

    (d) Describe a report that a Management Information System (MIS) could produce from the
        collected data.                                                                  [2]


8   Candidates are advised to use either pseudo code or a flow diagram to answer this
    question, although other forms of algorithmic representation will be credited.

    The automated snack bar is a machine.

    The machine advertises 10 snack items; each one is given a number from 0 to 9.

    The user presses one of the buttons from 0 to 9 on the front of the machine. The machine checks
    in an array in its memory to find the price of the snack selected. This price is displayed on the
    front of the machine.

    The customer then inserts 1-cent and/or 5-cent coins. Each time a coin is input the machine
    subtracts the value from the amount still required. The display changes to show the new amount
    still required.

    When enough coins have been inserted the machine will deliver the item and pay out any change
    necessary.

    Write an algorithm to control the process of buying a snack.                                  [9]




© UCLES 2009                                  9691/12/O/N/09



                               www.xtremepapers.net
6

      BLANK PAGE




       9691/12/O/N/09



www.xtremepapers.net
7

      BLANK PAGE




       9691/12/O/N/09



www.xtremepapers.net
8

                                                                  BLANK PAGE




Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

                                                                     9691/12/O/N/09



                                              www.xtremepapers.net

Weitere ähnliche Inhalte

Ähnlich wie Nov 09 P12

Ähnlich wie Nov 09 P12 (20)

Nov 05 P1
Nov 05 P1Nov 05 P1
Nov 05 P1
 
Nov 03 P1
Nov 03 P1Nov 03 P1
Nov 03 P1
 
Nov 08 P1
Nov 08 P1Nov 08 P1
Nov 08 P1
 
June 05 P1
June 05 P1June 05 P1
June 05 P1
 
June 10 P31
June 10 P31June 10 P31
June 10 P31
 
June 06 P1
June 06 P1June 06 P1
June 06 P1
 
Nov 06 P1
Nov 06 P1Nov 06 P1
Nov 06 P1
 
June 10 P32
June 10 P32June 10 P32
June 10 P32
 
Nov 05 P3
Nov 05 P3Nov 05 P3
Nov 05 P3
 
Nov 06 P3
Nov 06 P3Nov 06 P3
Nov 06 P3
 
June 10 P11
June 10 P11June 10 P11
June 10 P11
 
June 10 P12
June 10 P12June 10 P12
June 10 P12
 
June 08 P1
June 08 P1June 08 P1
June 08 P1
 
Nov 07 P3
Nov 07 P3Nov 07 P3
Nov 07 P3
 
June 06 P3
June 06 P3June 06 P3
June 06 P3
 
June 09 P1
June 09 P1June 09 P1
June 09 P1
 
June 03 P1
June 03 P1June 03 P1
June 03 P1
 
June 08 P3
June 08 P3June 08 P3
June 08 P3
 
June 07 P3
June 07 P3June 07 P3
June 07 P3
 
June 02 P1
June 02 P1June 02 P1
June 02 P1
 

Mehr von Samimvez (20)

Sql installation tutorial
Sql installation tutorialSql installation tutorial
Sql installation tutorial
 
Example3
Example3Example3
Example3
 
Coms1010 exam paper - nov10
Coms1010   exam paper - nov10Coms1010   exam paper - nov10
Coms1010 exam paper - nov10
 
Coms1010 exam paper - may 08
Coms1010   exam paper - may 08Coms1010   exam paper - may 08
Coms1010 exam paper - may 08
 
Example2
Example2Example2
Example2
 
Labsheet 3
Labsheet 3Labsheet 3
Labsheet 3
 
Labsheet 3,5
Labsheet 3,5Labsheet 3,5
Labsheet 3,5
 
EQ V3x
EQ V3xEQ V3x
EQ V3x
 
Eq v2
Eq v2Eq v2
Eq v2
 
3.6
3.63.6
3.6
 
3.2
3.23.2
3.2
 
3.10
3.103.10
3.10
 
3.1
3.13.1
3.1
 
3.3
3.33.3
3.3
 
3.8
3.83.8
3.8
 
3.4
3.43.4
3.4
 
3.7
3.73.7
3.7
 
3.5
3.53.5
3.5
 
3.9
3.93.9
3.9
 
June 02 MS2
June 02 MS2June 02 MS2
June 02 MS2
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Nov 09 P12

  • 1. UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS General Certificate of Education Advanced Subsidiary Level and Advanced Level COMPUTING 9691/12 Paper 1 October/November 2009 2 hours 30 minutes Additional Materials: Answer Booklet/Paper *9022551224* READ THESE INSTRUCTIONS FIRST If you have been given an Answer Booklet, follow the instructions on the front cover of the Booklet. Write your Centre number, candidate number and name on all the work you hand in. Write in dark blue or black pen. You may use a soft pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, highlighters, glue or correction fluid. Answer all questions. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. This document consists of 5 printed pages and 3 blank pages. IB09 11_9691_12/3RP © UCLES 2009 [Turn over www.xtremepapers.net
  • 2. 2 1 A student has a stand-alone computer at home and also uses the computers at school. She uses a USB stick, a DVD-RW drive and a CD-ROM drive on her home computer. (a) State a use that the student could make of each of the following, justifying your choices. (i) USB stick [2] (ii) DVD-RW drive [2] (iii) CD-ROM drive. [2] (b) State one other storage device that the student would need at home and say why it would be needed. [2] 2 (a) Define the following types of software: (i) operating system software, (ii) generic applications software, (iii) translator software, (iv) utility software. [4] (b) A computer system is based in a chemical factory. The chemical processes are all automatically controlled by the computer system which is operated from a central point. Discuss why it is important to have a good interface design on the system. [6] © UCLES 2009 9691/12/O/N/09 www.xtremepapers.net
  • 3. 3 3 A library stores details of members on the member file. (a) Members’ names are stored as strings of characters using ASCII. (i) State what is meant by a character set. [1] (ii) Describe how the ASCII character set is represented. [3] (b) When a member's name is input to the system it needs to be validated. (i) State what is meant by validation. [1] (ii) Describe two validation checks that can be carried out when a member's name is input to the system. [4] (c) The number of visits made by a member during the year is stored as an integer in a single byte. Mr Jyu has visited 135 times. Change 135 into the binary representation for the computer to store. [2] (d) The member file contains up to 10,000 records. The estimated size of each record is 250 bytes. Estimate the size of the member file using appropriate units. (Show your working.) [5] (e) Describe how the following types of software can be used in the library: (i) spreadsheet, [2] (ii) presentation software, [2] (iii) mail-merge software. [2] 4 (a) A medical centre has a number of stand-alone computers. It is decided that these should be linked in a LAN. (i) State three advantages and one disadvantage of networking the computers. [4] (ii) Explain the relationship between bit rates and the use of data content in a network. [2] (b) Describe the additional hardware required when a LAN is connected to a WAN. [4] © UCLES 2009 9691/12/O/N/09 [Turn over www.xtremepapers.net
  • 4. 4 The remaining questions refer to the following information. A large college has a cafeteria and an automated snack bar. Only staff and students of the college are allowed to purchase food and drink there. 5 The college decides to computerise the accounts of the cafeteria. The manager needs to decide between using off-the-shelf software or custom-written software. (a) Explain the difference between off-the-shelf and custom-written software. [2] (b) State three advantages of using off-the-shelf software in this situation. [3] 6 It is decided to employ a systems analyst to produce the new computer system. The analyst follows the system life cycle. (a) Identification of problem Feasibility study Information collection Analysis of problem Design of system Development and Testing Implementation Maintenance Obsolescence The system life cycle is shown in the diagram. Explain why the cycle is considered to be an iterative process. [3] (b) Describe how three parts of the feasibility study, carried out by the analyst, relate to the cafeteria and automated snack bar. [6] © UCLES 2009 9691/12/O/N/09 www.xtremepapers.net
  • 5. 5 7 Staff and students who buy food are identified by the system. Their purchases are charged to their accounts. These accounts are paid off at the end of each term. (a) Each student carries a magnetic stripe card to use with the system. (i) Describe how such a card works. [2] (ii) State two safeguards against improper use if it is stolen. [2] (b) Some members of staff are worried that their information may be misused. Data protection legislation is used to protect personal data. Describe the features of such legislation. [6] (c) The total value of the goods which a person has bought is shown at a checkout. Each person is given a statement, informing them what they currently owe, at the end of each month. (i) Explain what is meant by a batch operating system and state which of the two processes would be carried out by a batch operating system. [3] (ii) State a type of operating system which could be used for the other process described and justify your choice. [2] (d) Describe a report that a Management Information System (MIS) could produce from the collected data. [2] 8 Candidates are advised to use either pseudo code or a flow diagram to answer this question, although other forms of algorithmic representation will be credited. The automated snack bar is a machine. The machine advertises 10 snack items; each one is given a number from 0 to 9. The user presses one of the buttons from 0 to 9 on the front of the machine. The machine checks in an array in its memory to find the price of the snack selected. This price is displayed on the front of the machine. The customer then inserts 1-cent and/or 5-cent coins. Each time a coin is input the machine subtracts the value from the amount still required. The display changes to show the new amount still required. When enough coins have been inserted the machine will deliver the item and pay out any change necessary. Write an algorithm to control the process of buying a snack. [9] © UCLES 2009 9691/12/O/N/09 www.xtremepapers.net
  • 6. 6 BLANK PAGE 9691/12/O/N/09 www.xtremepapers.net
  • 7. 7 BLANK PAGE 9691/12/O/N/09 www.xtremepapers.net
  • 8. 8 BLANK PAGE Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge. 9691/12/O/N/09 www.xtremepapers.net