SlideShare a Scribd company logo
1 of 4
Download to read offline
UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS
                               General Certificate of Education Advanced Level




               COMPUTING                                                                                              9691/03
               Paper 3                                                                                       May/June 2009
                                                                                                                      2 hours
               Additional Materials:     Answer Booklet/Paper
*8280150975*




               READ THESE INSTRUCTIONS FIRST

               If you have been given an Answer Booklet, follow the instructions on the front cover of the Booklet.
               Write your Centre number, candidate number and name on all the work you hand in.
               Write in dark blue or black pen.
               You may use a soft pencil for any diagrams, graphs or rough working.
               Do not use staples, paper clips, highlighters, glue or correction fluid.

               Answer all questions.

               At the end of the examination, fasten all your work securely together.
               The number of marks is given in brackets [ ] at the end of each question or part question.




                                                This document consists of 4 printed pages.

               IB09 06_9691_03/RP
               © UCLES 2009                                                                                       [Turn over




                                               www.xtremepapers.net
2

1   Describe four facilities provided by email systems to help with managing messages received. [8]


2   (a) State what is meant by each of the following types of programming paradigm:

         (i) object-orientated,                                                                      [1]

        (ii) declarative.                                                                            [1]


    (b) Functions and procedures may be used to develop a program using stepwise refinement.

         (i) Explain what is meant by stepwise refinement.                                           [2]

        (ii) Describe what is meant by a function.                                                   [2]


    (c) A set of data items is stored in a sorted binary tree.

         Describe a procedure which will insert a new data item into the correct position in the sorted
         binary tree.                                                                                [4]


    (d) The finished program is to be run on a computer system.

         Explain the purpose of:

         (i) linkers,

        (ii) loaders

         in preparing the program to be run.                                                         [4]


3   (a) Describe how e-commerce works.                                                               [3]


    (b) Explain how the use of e-commerce could be beneficial for a small company.                   [4]




© UCLES 2009                                   9691/03/M/J/09



                               www.xtremepapers.net
3

4   A furniture shop sells a large number of different items whose details are stored in the STOCK
    table.

    The shop has a large number of customers whose details are stored in the CUSTOMER table.

    Some customers have an account. Each customer can only use one account. Some accounts
    can be used by more than one customer (for example all the members of one family may use the
    same account). Details of accounts are stored in the ACCOUNT table.


    (a) Draw the relationship between the CUSTOMER and ACCOUNT tables in the form of an
        entity-relationship (E-R) diagram.                                           [1]


    A number of stock items will be stored on each account. Each type of stock item will be stored on
    many accounts.

    (b) (i) State the type of relationship between the ACCOUNT and STOCK tables.                  [1]

        (ii) Draw the normalised relationship between the ACCOUNT and STOCK tables in the form
             of an E-R diagram.                                                             [2]


    (c) By using examples from the CUSTOMER table, explain what is meant by:

         (i) primary key,                                                                         [2]

        (ii) secondary key,                                                                       [2]

        (iii) foreign key.                                                                        [2]


    (d) Discuss the need for controlling access to the database tables and how access can be
        controlled.                                                                       [6]


5   (a) Describe basic Von Neumann processor architecture.                                        [3]


    (b) At a particular point in a program, the program counter (PC) contains the value 200.

         (i) State the expected value contained in the PC after the instruction held at location 200
             has been fetched.

               Explain your answer.                                                               [2]

        (ii) After the instruction is processed, the value in the PC is 180.

               Explain why the value has changed to 180.                                          [2]




© UCLES 2009                                  9691/03/M/J/09                              [Turn over


                               www.xtremepapers.net
4

6     (a) Show how the denary number –90 can be represented, using 8 bits, in:

             (i) sign and magnitude,

            (ii) two’s complement.                                                                                                                       [2]


      (b) The denary number 10¾ is to be represented as a floating point binary number using 12 bits.
          The first 8 bits are to be used for the mantissa and the remaining four bits are to be used for
          the exponent.

             (i) Explain what is meant by the mantissa of a floating point number.                                                                       [2]

            (ii) Explain what is meant by the exponent of a floating point number.                                                                       [2]

           (iii) Show why 001010110101 is a floating point representation of 10¾.                                                                        [3]

           (iv) Normalise the floating point value given in (iii).                                                                                       [2]


7     (a) Describe a Gantt chart and explain how it can be used in the development of a computer
          system.                                                                            [4]


      (b) When a new computer system has been produced it is necessary to supply documentation
          with it.

             Explain what is meant by user documentation and what it would be expected to contain.                                                       [6]


8     A large supermarket has been designed.

      The operation of the supermarket is to be simulated in order to carry out thorough testing of the
      design.

      (a) Explain why simulation needs to be used to test the design.                                                                                    [3]


      (b) One aspect of the simulation is to ensure that people can leave the building safely if a fire
          breaks out.

             (i) State three variables which would need to be input in order to set up the simulation. For
                 each of your variables explain why they are necessary.                                 [6]

            (ii) Explain why it may be useful to use parallel processing to run the simulation.                                                          [2]


9     Explain how interrupts are dealt with by a processor and how interrupted jobs may later be
      resumed.                                                                                [6]




Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2009                                                         9691/03/M/J/09



                                              www.xtremepapers.net

More Related Content

What's hot

What's hot (20)

Nov 09 P31
Nov 09 P31Nov 09 P31
Nov 09 P31
 
June 05 P3
June 05 P3June 05 P3
June 05 P3
 
June 10 P31
June 10 P31June 10 P31
June 10 P31
 
June 10 P32
June 10 P32June 10 P32
June 10 P32
 
Nov 09 P11
Nov 09 P11Nov 09 P11
Nov 09 P11
 
June 04 P3
June 04 P3June 04 P3
June 04 P3
 
Nov 06 P3
Nov 06 P3Nov 06 P3
Nov 06 P3
 
June 06 P3
June 06 P3June 06 P3
June 06 P3
 
Nov 05 P3
Nov 05 P3Nov 05 P3
Nov 05 P3
 
June 05 P1
June 05 P1June 05 P1
June 05 P1
 
June 04 P31
June 04 P31June 04 P31
June 04 P31
 
Nov 07 P1
Nov 07 P1Nov 07 P1
Nov 07 P1
 
Nov 06 P1
Nov 06 P1Nov 06 P1
Nov 06 P1
 
June 02 MS2
June 02 MS2June 02 MS2
June 02 MS2
 
June 08 P1
June 08 P1June 08 P1
June 08 P1
 
Nov 08 P1
Nov 08 P1Nov 08 P1
Nov 08 P1
 
January 2010
January 2010January 2010
January 2010
 
June 2006
June 2006June 2006
June 2006
 
June 07 P1
June 07 P1June 07 P1
June 07 P1
 
January 2011
January 2011January 2011
January 2011
 

Similar to June 09 P3

June 03 P1
June 03 P1June 03 P1
June 03 P1Samimvez
 
Nov 09 P12
Nov 09 P12Nov 09 P12
Nov 09 P12Samimvez
 
Computing paper 1 may june 2008 computers cambridge test paper zimsec zimbabw...
Computing paper 1 may june 2008 computers cambridge test paper zimsec zimbabw...Computing paper 1 may june 2008 computers cambridge test paper zimsec zimbabw...
Computing paper 1 may june 2008 computers cambridge test paper zimsec zimbabw...Alpro
 
June 06 P1
June 06 P1June 06 P1
June 06 P1Samimvez
 
Computer paper 3 may june 2008 9691 cambridge General Certificate of educatio...
Computer paper 3 may june 2008 9691 cambridge General Certificate of educatio...Computer paper 3 may june 2008 9691 cambridge General Certificate of educatio...
Computer paper 3 may june 2008 9691 cambridge General Certificate of educatio...Alpro
 
June 10 P11
June 10 P11June 10 P11
June 10 P11Samimvez
 
June 10 P12
June 10 P12June 10 P12
June 10 P12Samimvez
 

Similar to June 09 P3 (15)

Nov 08 P3
Nov 08 P3Nov 08 P3
Nov 08 P3
 
Nov 04 P3
Nov 04 P3Nov 04 P3
Nov 04 P3
 
Nov 05 P1
Nov 05 P1Nov 05 P1
Nov 05 P1
 
June 03 P1
June 03 P1June 03 P1
June 03 P1
 
Nov 07 P3
Nov 07 P3Nov 07 P3
Nov 07 P3
 
Nov 04 P1
Nov 04 P1Nov 04 P1
Nov 04 P1
 
Nov 09 P12
Nov 09 P12Nov 09 P12
Nov 09 P12
 
Nov 03 P1
Nov 03 P1Nov 03 P1
Nov 03 P1
 
Computing paper 1 may june 2008 computers cambridge test paper zimsec zimbabw...
Computing paper 1 may june 2008 computers cambridge test paper zimsec zimbabw...Computing paper 1 may june 2008 computers cambridge test paper zimsec zimbabw...
Computing paper 1 may june 2008 computers cambridge test paper zimsec zimbabw...
 
June 06 P1
June 06 P1June 06 P1
June 06 P1
 
Nov 04 P2
Nov 04 P2Nov 04 P2
Nov 04 P2
 
Computer paper 3 may june 2008 9691 cambridge General Certificate of educatio...
Computer paper 3 may june 2008 9691 cambridge General Certificate of educatio...Computer paper 3 may june 2008 9691 cambridge General Certificate of educatio...
Computer paper 3 may june 2008 9691 cambridge General Certificate of educatio...
 
June 10 P11
June 10 P11June 10 P11
June 10 P11
 
June 10 P12
June 10 P12June 10 P12
June 10 P12
 
Paper
PaperPaper
Paper
 

More from Samimvez

More from Samimvez (20)

Sql installation tutorial
Sql installation tutorialSql installation tutorial
Sql installation tutorial
 
Example3
Example3Example3
Example3
 
Coms1010 exam paper - nov10
Coms1010   exam paper - nov10Coms1010   exam paper - nov10
Coms1010 exam paper - nov10
 
Coms1010 exam paper - may 08
Coms1010   exam paper - may 08Coms1010   exam paper - may 08
Coms1010 exam paper - may 08
 
Example2
Example2Example2
Example2
 
Labsheet 3
Labsheet 3Labsheet 3
Labsheet 3
 
Labsheet 3,5
Labsheet 3,5Labsheet 3,5
Labsheet 3,5
 
EQ V3x
EQ V3xEQ V3x
EQ V3x
 
Eq v2
Eq v2Eq v2
Eq v2
 
3.6
3.63.6
3.6
 
3.2
3.23.2
3.2
 
3.10
3.103.10
3.10
 
3.1
3.13.1
3.1
 
3.3
3.33.3
3.3
 
3.8
3.83.8
3.8
 
3.4
3.43.4
3.4
 
3.7
3.73.7
3.7
 
3.5
3.53.5
3.5
 
3.9
3.93.9
3.9
 
June 05 MS2
June 05 MS2June 05 MS2
June 05 MS2
 

Recently uploaded

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

June 09 P3

  • 1. UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS General Certificate of Education Advanced Level COMPUTING 9691/03 Paper 3 May/June 2009 2 hours Additional Materials: Answer Booklet/Paper *8280150975* READ THESE INSTRUCTIONS FIRST If you have been given an Answer Booklet, follow the instructions on the front cover of the Booklet. Write your Centre number, candidate number and name on all the work you hand in. Write in dark blue or black pen. You may use a soft pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, highlighters, glue or correction fluid. Answer all questions. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. This document consists of 4 printed pages. IB09 06_9691_03/RP © UCLES 2009 [Turn over www.xtremepapers.net
  • 2. 2 1 Describe four facilities provided by email systems to help with managing messages received. [8] 2 (a) State what is meant by each of the following types of programming paradigm: (i) object-orientated, [1] (ii) declarative. [1] (b) Functions and procedures may be used to develop a program using stepwise refinement. (i) Explain what is meant by stepwise refinement. [2] (ii) Describe what is meant by a function. [2] (c) A set of data items is stored in a sorted binary tree. Describe a procedure which will insert a new data item into the correct position in the sorted binary tree. [4] (d) The finished program is to be run on a computer system. Explain the purpose of: (i) linkers, (ii) loaders in preparing the program to be run. [4] 3 (a) Describe how e-commerce works. [3] (b) Explain how the use of e-commerce could be beneficial for a small company. [4] © UCLES 2009 9691/03/M/J/09 www.xtremepapers.net
  • 3. 3 4 A furniture shop sells a large number of different items whose details are stored in the STOCK table. The shop has a large number of customers whose details are stored in the CUSTOMER table. Some customers have an account. Each customer can only use one account. Some accounts can be used by more than one customer (for example all the members of one family may use the same account). Details of accounts are stored in the ACCOUNT table. (a) Draw the relationship between the CUSTOMER and ACCOUNT tables in the form of an entity-relationship (E-R) diagram. [1] A number of stock items will be stored on each account. Each type of stock item will be stored on many accounts. (b) (i) State the type of relationship between the ACCOUNT and STOCK tables. [1] (ii) Draw the normalised relationship between the ACCOUNT and STOCK tables in the form of an E-R diagram. [2] (c) By using examples from the CUSTOMER table, explain what is meant by: (i) primary key, [2] (ii) secondary key, [2] (iii) foreign key. [2] (d) Discuss the need for controlling access to the database tables and how access can be controlled. [6] 5 (a) Describe basic Von Neumann processor architecture. [3] (b) At a particular point in a program, the program counter (PC) contains the value 200. (i) State the expected value contained in the PC after the instruction held at location 200 has been fetched. Explain your answer. [2] (ii) After the instruction is processed, the value in the PC is 180. Explain why the value has changed to 180. [2] © UCLES 2009 9691/03/M/J/09 [Turn over www.xtremepapers.net
  • 4. 4 6 (a) Show how the denary number –90 can be represented, using 8 bits, in: (i) sign and magnitude, (ii) two’s complement. [2] (b) The denary number 10¾ is to be represented as a floating point binary number using 12 bits. The first 8 bits are to be used for the mantissa and the remaining four bits are to be used for the exponent. (i) Explain what is meant by the mantissa of a floating point number. [2] (ii) Explain what is meant by the exponent of a floating point number. [2] (iii) Show why 001010110101 is a floating point representation of 10¾. [3] (iv) Normalise the floating point value given in (iii). [2] 7 (a) Describe a Gantt chart and explain how it can be used in the development of a computer system. [4] (b) When a new computer system has been produced it is necessary to supply documentation with it. Explain what is meant by user documentation and what it would be expected to contain. [6] 8 A large supermarket has been designed. The operation of the supermarket is to be simulated in order to carry out thorough testing of the design. (a) Explain why simulation needs to be used to test the design. [3] (b) One aspect of the simulation is to ensure that people can leave the building safely if a fire breaks out. (i) State three variables which would need to be input in order to set up the simulation. For each of your variables explain why they are necessary. [6] (ii) Explain why it may be useful to use parallel processing to run the simulation. [2] 9 Explain how interrupts are dealt with by a processor and how interrupted jobs may later be resumed. [6] Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge. © UCLES 2009 9691/03/M/J/09 www.xtremepapers.net